Sciweavers

2880 search results - page 419 / 576
» context 2007
Sort
View
162
Voted
FUZZIEEE
2007
IEEE
15 years 11 months ago
Genetic Learning of Membership Functions for Mining Fuzzy Association Rules
— Data mining is most commonly used in attempts to induce association rules from transaction data. Most previous studies focused on binary-valued transaction data. Transaction da...
Rafael Alcalá, Jesús Alcalá-F...
GLOBECOM
2007
IEEE
15 years 11 months ago
Frequency Agile Interference-Aware Channel Sounding for Dynamic Spectrum Access Networks
— In this paper, we propose a novel channel sounding technique, called the multicarrier direct sequence swept time delay cross-correlation (MC-DS-STDCC), which is designed to min...
Qi Chen, Alexander M. Wyglinski, Gary J. Minden
GLOBECOM
2007
IEEE
15 years 11 months ago
Exit Policy Violations in Multi-Hop Overlay Routes: Analysis and Mitigation
— The traffic exchanged between two overlay nodes in different autonomous systems (AS) is always subjected to a series of inter-domain policies. However, overlay routing often m...
Srinivasan Seetharaman, Mostafa H. Ammar
144
Voted
GLOBECOM
2007
IEEE
15 years 11 months ago
Constrained Stochastic Games in Wireless Networks
—We consider the situation where N nodes share a common access point. With each node i there is an associated buffer and channel state that change in time. Node i dynamically cho...
Eitan Altaian, Konstantin Avrachenkov, Nicolas Bon...
HICSS
2007
IEEE
126views Biometrics» more  HICSS 2007»
15 years 11 months ago
Contract as a Source of Trust--Commitment in Successful IT Outsourcing Relationship: An Empirical Study
Existing studies on IT outsourcing have mainly examined partnership factors that influence IT outsourcing effectiveness. This stream of IT outsourcing research has largely ignored...
Jahyun Goo, Kichan Nam