Sciweavers

9290 search results - page 1619 / 1858
» The Predictability of Data Values
Sort
View
EMS
2008
IEEE
15 years 11 months ago
A Weighted Utility Framework for Mining Association Rules
Association rule mining (ARM) identifies frequent itemsets from databases and generates association rules by assuming that all items have the same significance and frequency of oc...
M. Sulaiman Khan, Maybin K. Muyeba, Frans Coenen
ETFA
2008
IEEE
15 years 11 months ago
e-based inter-enterprise supply chain Kanban for demand and order fulfilment management
– The philosophy of Kanban is that parts and materials should be supplied at the very moment they are needed in the factory manufacturing process. e-based inter-enterprise supply...
Linton L. S. Chai
GLOBECOM
2008
IEEE
15 years 11 months ago
Interference Reduction by Beamforming in Cognitive Networks
— We consider beamforming in a cognitive network with multiple primary users and secondary users sharing the same spectrum. In particular, we assume that each secondary transmitt...
Simon Yiu, Mai Vu, Vahid Tarokh
131
Voted
GLOBECOM
2008
IEEE
15 years 11 months ago
Support Vector Machines and Random Forests Modeling for Spam Senders Behavior Analysis
— Unwanted and malicious messages dominate Email traffic and pose a great threat to the utility of email communications. Reputation systems have been getting momentum as the sol...
Yuchun Tang, Sven Krasser, Yuanchen He, Weilai Yan...
GLVLSI
2008
IEEE
140views VLSI» more  GLVLSI 2008»
15 years 11 months ago
A table-based method for single-pass cache optimization
Due to the large contribution of the memory subsystem to total system power, the memory subsystem is highly amenable to customization for reduced power/energy and/or improved perf...
Pablo Viana, Ann Gordon-Ross, Edna Barros, Frank V...
« Prev « First page 1619 / 1858 Last » Next »