Sciweavers

572 search results - page 98 / 115
» metrics 2005
Sort
View
87
Voted
ICAPR
2005
Springer
15 years 3 months ago
Recognition Tasks Are Imitation Games
There is need for more formal specification of recognition tasks. Currently, it is common to use labeled training samples to illustrate the task to be performed. The mathematical ...
Richard Zanibbi, Dorothea Blostein, James R. Cordy
54
Voted
ICCBR
2005
Springer
15 years 3 months ago
A Knowledge-Intensive Method for Conversational CBR
In conversational case-based reasoning (CCBR), a main problem is how to select the most discriminative questions and display them to users in a natural way to alleviate users’ co...
Mingyang Gu, Agnar Aamodt
80
Voted
ICCNMC
2005
Springer
15 years 3 months ago
A System for Power-Aware Agent-Based Intrusion Detection (SPAID) in Wireless Ad Hoc Networks
In this paper, we propose a distributed hierarchical intrusion detection system, for ad hoc wireless networks, based on a power level metric for potential ad hoc hosts, which is us...
T. Srinivasan, Jayesh Seshadri, J. B. Siddharth Jo...
ICWE
2005
Springer
15 years 3 months ago
An Investigation of Cloning in Web Applications
Cloning (ad hoc reuse by duplication of design or code) speeds up development, but also hinders future maintenance. Cloning also hints at reuse opportunities that, if exploited sys...
Damith C. Rajapakse, Stan Jarzabek
ISCIS
2005
Springer
15 years 3 months ago
Admission Control for Multicast Routing with Quality of Service in Ad Hoc Networks
Ad hoc networks, being able to organize themselves without user intervention, can easily provide their users with mobility, multimedia support and group communication. However, the...
Kaan Bür, Cem Ersoy