Sciweavers

1628 search results - page 269 / 326
» {Performance Modeling and Evaluation of Large-Scale J2EE App...
Sort
View
TWC
2008
156views more  TWC 2008»
13 years 8 months ago
Secure and Fault-Tolerant Event Boundary Detection in Wireless Sensor Networks
Event boundary detection is in and of itself a useful application in wireless sensor networks (WSNs). Typically, it includes the detection of a large-scale spatial phenomenon such ...
Kui Ren, Kai Zeng, Wenjing Lou
IDA
2000
Springer
13 years 8 months ago
Reducing redundancy in characteristic rule discovery by using integer programming techniques
The discovery of characteristic rules is a well-known data mining task and has lead to several successful applications. However, because of the descriptive nature of characteristic...
Tom Brijs, Koen Vanhoof, Geert Wets
PR
2002
88views more  PR 2002»
13 years 8 months ago
Indexing chromatic and achromatic patterns for content-based colour image retrieval
In this paper, we present a method to represent achromatic and chromatic image signals independently for content-based image indexing and retrieval for image database applications...
Guoping Qiu
SPRINGSIM
2010
13 years 7 months ago
SES-based ontological process for high level information fusion
—Data Fusion (DF) process is in the interest of the military community since it provides the opportunity to achieve information superiority. The System Entity Structure (SES) is ...
Hojun Lee, Bernard P. Zeigler
ATAL
2009
Springer
14 years 3 months ago
Computing optimal randomized resource allocations for massive security games
Predictable allocations of security resources such as police officers, canine units, or checkpoints are vulnerable to exploitation by attackers. Recent work has applied game-theo...
Christopher Kiekintveld, Manish Jain, Jason Tsai, ...