Sciweavers

815 search results - page 91 / 163
» Social network analysis and interactive device design analys...
Sort
View
SDM
2009
SIAM
204views Data Mining» more  SDM 2009»
15 years 8 months ago
Application of Bayesian Partition Models in Warranty Data Analysis.
Automotive companies are forced to continuously extend and improve their product line-up. However, increasing diversity, higher design complexity, and shorter development cycles c...
Axel Blumenstock, Christoph Schlieder, Markus M&uu...
KDD
2012
ACM
271views Data Mining» more  KDD 2012»
13 years 1 months ago
GigaTensor: scaling tensor analysis up by 100 times - algorithms and discoveries
Many data are modeled as tensors, or multi dimensional arrays. Examples include the predicates (subject, verb, object) in knowledge bases, hyperlinks and anchor texts in the Web g...
U. Kang, Evangelos E. Papalexakis, Abhay Harpale, ...
104
Voted
FUNGAMES
2010
14 years 9 months ago
panOULU conqueror: pervasive location-aware multiplayer game for city-wide wireless network
We present the design, implementation and evaluation of a novel pervasive location-aware multiplayer game. In the game teams of players try to score points by conquering the real-...
Juha Tiensyrjä, Timo Ojala, Toni Hakanen, Oss...
CODES
2007
IEEE
15 years 5 months ago
Improved response time analysis of tasks scheduled under preemptive Round-Robin
Round-Robin scheduling is the most popular time triggered scheduling policy, and has been widely used in communication networks for the last decades. It is an efficient schedulin...
Razvan Racu, Li Li, Rafik Henia, Arne Hamann, Rolf...
GECCO
2004
Springer
121views Optimization» more  GECCO 2004»
15 years 4 months ago
Vulnerability Analysis of Immunity-Based Intrusion Detection Systems Using Evolutionary Hackers
Artificial Immune Systems (AISs) are biologically inspired problem solvers that have been used successfully as intrusion detection systems (IDSs). This paper describes how the des...
Gerry V. Dozier, Douglas Brown, John Hurley, Kryst...