Sciweavers

5882 search results - page 1065 / 1177
» networks 2010
Sort
View
IAT
2010
IEEE
14 years 10 months ago
Using Negotiation to Reduce Redundant Autonomous Mobile Program Movements
Distributed load managers exhibit thrashing where tasks are repeatedly moved between locations due to incomplete global load information. This paper shows that systems of Autonomou...
Natalia Chechina, Peter King, Phil Trinder
ICASSP
2010
IEEE
14 years 10 months ago
Towards objectifying information hiding
In this paper, the concept of object-oriented embedding (OOE) is introduced into information hiding in general and particularly to steganography which is the science that involves...
Abbas Cheddad, Joan Condell, Kevin Curran, Paul Mc...
ICDCS
2010
IEEE
14 years 10 months ago
Safe and Stabilizing Distributed Cellular Flows
Advances in wireless vehicular networks present us with opportunities for developing new distributed traffic control algorithms that avoid phenomena such as abrupt phase-transition...
Taylor Johnson, Sayan Mitra, Karthik Manamcheri
ICDM
2010
IEEE
187views Data Mining» more  ICDM 2010»
14 years 10 months ago
Financial Forecasting with Gompertz Multiple Kernel Learning
Financial forecasting is the basis for budgeting activities and estimating future financing needs. Applying machine learning and data mining models to financial forecasting is both...
Han Qin, Dejing Dou, Yue Fang
ICDM
2010
IEEE
216views Data Mining» more  ICDM 2010»
14 years 10 months ago
Data Editing Techniques to Allow the Application of Distance-Based Outlier Detection to Streams
The problem of finding outliers in data has broad applications in areas as diverse as data cleaning, fraud detection, network monitoring, invasive species monitoring, etc. While th...
Vit Niennattrakul, Eamonn J. Keogh, Chotirat Ann R...
« Prev « First page 1065 / 1177 Last » Next »