Sciweavers

1521 search results - page 262 / 305
» The Evolution of Information Assurance
Sort
View
SMC
2010
IEEE
276views Control Systems» more  SMC 2010»
14 years 9 months ago
A Modified Invasive Weed Optimization Algorithm for training of feed- forward Neural Networks
— Invasive Weed Optimization Algorithm IWO) is an ecologically inspired metaheuristic that mimics the process of weeds colonization and distribution and is capable of solving mul...
Ritwik Giri, Aritra Chowdhury, Arnob Ghosh, Swagat...
VL
2010
IEEE
256views Visual Languages» more  VL 2010»
14 years 9 months ago
SheetDiff: A Tool for Identifying Changes in Spreadsheets
Most spreadsheets, like other software, change over time. A frequently occurring scenario is the repeated reuse and adaptation of spreadsheets from one project to another. If seve...
Chris Chambers, Martin Erwig, Markus Luckey
VTC
2010
IEEE
184views Communications» more  VTC 2010»
14 years 9 months ago
Cooperative Interference Prediction for Enhanced Link Adaptation in the 3GPP LTE Uplink
—The interference situation in the uplink of cellular networks, such as the 3GPP UTRAN Long Term Evolution (LTE), is usually highly volatile since from one transmission time inte...
Andreas Müller, Philipp Frank
WINET
2010
147views more  WINET 2010»
14 years 9 months ago
Hybrid trust and reputation management for sensor networks
Wireless sensor networks are characterised by the distributed nature of their operation and the resource constraints on the nodes. Trust management schemes that are targeted at sen...
Efthimia Aivaloglou, Stefanos Gritzalis
ICDM
2010
IEEE
202views Data Mining» more  ICDM 2010»
14 years 9 months ago
Discovering Overlapping Groups in Social Media
Abstract--The increasing popularity of social media is shortening the distance between people. Social activities, e.g., tagging in Flickr, bookmarking in Delicious, twittering in T...
Xufei Wang, Lei Tang, Huiji Gao, Huan Liu