Sciweavers

5544 search results - page 275 / 1109
» Three Inadequate Models
Sort
View
WEBI
2009
Springer
15 years 11 months ago
Social Semantics and Its Evaluation by Means of Semantic Relatedness and Open Topic Models
—This paper presents an approach using social semantics for the task of topic labelling by means of Open Topic Models. Our approach utilizes a social ontology to create an alignm...
Ulli Waltinger, Alexander Mehler
INFOCOM
2008
IEEE
15 years 11 months ago
Modeling the Evolution of Degree Correlation in Scale-Free Topology Generators
—In this paper, we examine the asymptotic behavior of degree correlation (i.e., the joint degree distribution of adjacent nodes) in several scale-free topology generators GED [13...
Xiaoming Wang, Xiliang Liu, Dmitri Loguinov
WCNC
2008
IEEE
15 years 11 months ago
Performance Modeling of Power Saving Classes with Multiple Connections for Broadband Wireless Networks
—Different types of power-saving techniques have been proposed in various fields to alleviate the limitation on the battery lifetime for the mobile stations (MSs). In order to p...
Yu-Pin Hsu, Kai-Ten Feng
ICC
2007
IEEE
141views Communications» more  ICC 2007»
15 years 11 months ago
A Hybrid Model to Detect Malicious Executables
— We present a hybrid data mining approach to detect malicious executables. In this approach we identify important features of the malicious and benign executables. These feature...
Mohammad M. Masud, Latifur Khan, Bhavani M. Thurai...
155
Voted
ICCAD
2006
IEEE
138views Hardware» more  ICCAD 2006»
15 years 11 months ago
Stepping forward with interpolants in unbounded model checking
This paper addresses SAT-based Unbounded Model Checking based on Craig Interpolants. This recently introduced methodology is often able to outperform BDDs and other SAT-based tech...
Gianpiero Cabodi, Marco Murciano, Sergio Nocco, St...