Sciweavers

2176 search results - page 353 / 436
» Refactoring Methods for Knowledge Bases
Sort
View
CCS
2005
ACM
15 years 9 months ago
Provable anonymity
This paper provides a formal framework for the analysis of information hiding properties of anonymous communication protocols in terms of epistemic logic. The key ingredient is ou...
Flavio D. Garcia, Ichiro Hasuo, Wolter Pieters, Pe...
GECCO
2005
Springer
162views Optimization» more  GECCO 2005»
15 years 8 months ago
An autonomous explore/exploit strategy
In reinforcement learning problems it has been considered that neither exploitation nor exploration can be pursued exclusively without failing at the task. The optimal balance bet...
Alex McMahon, Dan Scott, William N. L. Browne
MSN
2005
Springer
179views Sensor Networks» more  MSN 2005»
15 years 8 months ago
Coverage Analysis for Wireless Sensor Networks
The coverage problem in wireless sensor networks (WSNs) is to determine the number of active sensor nodes needed to cover the sensing area. The purpose is to extend the lifetime of...
Ming Liu, Jiannong Cao, Wei Lou, Lijun Chen 0006, ...
137
Voted
OTM
2005
Springer
15 years 8 months ago
Biomedical Retrieval: How Can a Thesaurus Help?
Abstract. Searching specialized collections, such as biomedical literature, typically requires intimate knowledge of a specialized terminology. Hence, it can be a disappointing exp...
Leonie IJzereef, Jaap Kamps, Maarten de Rijke
MM
2004
ACM
248views Multimedia» more  MM 2004»
15 years 8 months ago
Incremental semi-supervised subspace learning for image retrieval
Subspace learning techniques are widespread in pattern recognition research. They include Principal Component Analysis (PCA), Locality Preserving Projection (LPP), etc. These tech...
Xiaofei He