Sciweavers

854 search results - page 111 / 171
» Using Simulation to Investigate Requirements Prioritization ...
Sort
View
SPAA
2010
ACM
15 years 3 months ago
Securing every bit: authenticated broadcast in radio networks
This paper studies non-cryptographic authenticated broadcast in radio networks subject to malicious failures. We introduce two protocols that address this problem. The first, Nei...
Dan Alistarh, Seth Gilbert, Rachid Guerraoui, Zark...
KCAP
2011
ACM
14 years 1 months ago
Integrating knowledge capture and supervised learning through a human-computer interface
Some supervised-learning algorithms can make effective use of domain knowledge in addition to the input-output pairs commonly used in machine learning. However, formulating this a...
Trevor Walker, Gautam Kunapuli, Noah Larsen, David...
TON
2010
147views more  TON 2010»
14 years 9 months ago
Coverage-time optimization for clustered wireless sensor networks: a power-balancing approach
—In this paper, we investigate the maximization of the coverage time for a clustered wireless sensor network (WSN) by optimal balancing of power consumption among cluster heads (...
Tao Shu, Marwan Krunz
BMCBI
2011
14 years 2 months ago
Robust joint analysis allowing for model uncertainty in two-stage genetic association studies
Background: The cost efficient two-stage design is often used in genome-wide association studies (GWASs) in searching for genetic loci underlying the susceptibility for complex di...
Dongdong Pan, Qizhai Li, Ningning Jiang, Aiyi Liu,...
BMCBI
2010
113views more  BMCBI 2010»
14 years 11 months ago
Class prediction for high-dimensional class-imbalanced data
Background: The goal of class prediction studies is to develop rules to accurately predict the class membership of new samples. The rules are derived using the values of the varia...
Rok Blagus, Lara Lusa