Sciweavers

2705 search results - page 467 / 541
» Splitting the sensor node
Sort
View
124
Voted
JEC
2006
61views more  JEC 2006»
15 years 3 months ago
Time-constrained loop scheduling with minimal resources
Many applications commonly found in digital signal processing and image processing applications can be represented by data-flow graphs (DFGs). In our previous work, we proposed a ...
Timothy W. O'Neil, Edwin Hsing-Mean Sha
ML
2006
ACM
163views Machine Learning» more  ML 2006»
15 years 3 months ago
Extremely randomized trees
Abstract This paper proposes a new tree-based ensemble method for supervised classification and regression problems. It essentially consists of randomizing strongly both attribute ...
Pierre Geurts, Damien Ernst, Louis Wehenkel
108
Voted
CP
2010
Springer
15 years 1 months ago
An Empirical Study of Optimization for Maximizing Diffusion in Networks
Abstract. We study the problem of maximizing the amount of stochastic diffusion in a network by acquiring nodes within a certain limited budget. We use a Sample Average Approximati...
Kiyan Ahmadizadeh, Bistra N. Dilkina, Carla P. Gom...
128
Voted
ICONIP
2009
15 years 1 months ago
Fuzzy Decision Tree Induction Approach for Mining Fuzzy Association Rules
Decision Tree Induction (DTI), one of the Data Mining classification methods, is used in this research for predictive problem solving in analyzing patient medical track records. In...
Rolly Intan, Oviliani Yenty Yuliana
ACSAC
2007
IEEE
15 years 9 months ago
Countering False Accusations and Collusion in the Detection of In-Band Wormholes
Cooperative intrusion detection techniques for MANETs utilize ordinary computing hosts as network intrusion sensors. If compromised, these hosts may inject bogus data into the int...
Daniel Sterne, Geoffrey Lawler, Richard Gopaul, Br...