Sciweavers

8468 search results - page 1535 / 1694
» The Technology of Data Stashing
Sort
View
103
Voted
IDA
2006
Springer
14 years 10 months ago
Backward chaining rule induction
Exploring the vast number of possible feature interactions in domains such as gene expression microarray data is an onerous task. We describe Backward-Chaining Rule Induction (BCR...
Douglas H. Fisher, Mary E. Edgerton, Zhihua Chen, ...
CORR
2007
Springer
146views Education» more  CORR 2007»
14 years 10 months ago
The Long Term Fate of Our Digital Belongings: Toward a Service Model for Personal Archives
We conducted a preliminary field study to understand the current state of personal digital archiving in practice. Our aim is to design a service for the long-term storage, preserv...
Catherine C. Marshall, Sara A. Bly, Francoise Brun...
KER
2008
107views more  KER 2008»
14 years 10 months ago
Tuplespace-based computing for the Semantic Web: a survey of the state-of-the-art
Semantic technologies promise to solve many challenging problems of the present Web applications. As they achieve a feasible level of maturity, they become increasingly accepted i...
Lyndon J. B. Nixon, Elena Paslaru Bontas Simperl, ...
KES
2008
Springer
14 years 10 months ago
Classification and Retrieval through Semantic Kernels
Abstract. This work proposes a family of language-independent semantic kernel functions defined for individuals in an ontology. This allows exploiting wellfounded kernel methods fo...
Claudia d'Amato, Nicola Fanizzi, Floriana Esposito
NETWORK
2006
186views more  NETWORK 2006»
14 years 10 months ago
Multiuser cross-layer resource allocation for video transmission over wireless networks
With the advancement of video-compression technology and the wide deployment of wireless networks, there is an increasing demand for wireless video communication services, and man...
Guan-Ming Su, Zhu Han, Min Wu, K. J. Ray Liu
« Prev « First page 1535 / 1694 Last » Next »