Sciweavers

3818 search results - page 749 / 764
» A Comparative Study on the Performance of Wireless Sensor Ne...
Sort
View
ASIAN
2004
Springer
117views Algorithms» more  ASIAN 2004»
14 years 4 days ago
The Feature Selection and Intrusion Detection Problems
Cyber security is a serious global concern. The potential of cyber terrorism has posed a threat to national security; meanwhile the increasing prevalence of malware and incidents o...
Andrew H. Sung, Srinivas Mukkamala
WCNC
2010
IEEE
13 years 10 months ago
Frequency Reuse Techniques for Attaining Both Coverage and High Spectral Efficiency in OFDMA Cellular Systems
—Inter-cell interference (ICI) is always a big obstacle to attain wide area coverage and high spectral efficiency in cellular systems. In this work we make a study of two well-kn...
Zheng Xie, Bernhard Walke
TPDS
2008
175views more  TPDS 2008»
13 years 6 months ago
Centralized versus Distributed Schedulers for Bag-of-Tasks Applications
Multiple applications that execute concurrently on heterogeneous platforms compete for CPU and network resources. In this paper, we consider the problem of scheduling applications ...
Olivier Beaumont, Larry Carter, Jeanne Ferrante, A...
TVLSI
2008
139views more  TVLSI 2008»
13 years 6 months ago
Ternary CAM Power and Delay Model: Extensions and Uses
Applications in computer networks often require high throughput access to large data structures for lookup and classification. While advanced algorithms exist to speed these search...
Banit Agrawal, Timothy Sherwood
IWANN
2009
Springer
14 years 1 months ago
Feature Selection in Survival Least Squares Support Vector Machines with Maximal Variation Constraints
This work proposes the use of maximal variation analysis for feature selection within least squares support vector machines for survival analysis. Instead of selecting a subset of ...
Vanya Van Belle, Kristiaan Pelckmans, Johan A. K. ...