Sciweavers

813 search results - page 38 / 163
» A comparison of evaluation methods in coevolution
Sort
View
ENTCS
2008
390views more  ENTCS 2008»
13 years 6 months ago
Cryptographic Versus Trust-based Methods for MANET Routing Security
Mobile Ad-hoc Networks (MANETs) allow wireless nodes to form a network without requiring a fixed infrastructure. Early routing protocols for MANETs failed to take security issues ...
Jared Cordasco, Susanne Wetzel
BMCBI
2006
119views more  BMCBI 2006»
13 years 7 months ago
Evaluation of microarray data normalization procedures using spike-in experiments
Background: Recently, a large number of methods for the analysis of microarray data have been proposed but there are few comparisons of their relative performances. By using so-ca...
Patrik Rydén, Henrik Andersson, Mattias Lan...
VTC
2006
IEEE
199views Communications» more  VTC 2006»
14 years 1 months ago
Comparison of User Mobility Pattern Prediction Algorithms to increase Handover Trigger Accuracy
— The estimation of correct triggers for handover in cellular networks belongs to the critical tasks for accurate network operation. The importance of seamless handover even rise...
Stefan Michaelis, Christian Wietfeld
TMI
2010
172views more  TMI 2010»
13 years 6 months ago
Comparison of AdaBoost and Support Vector Machines for Detecting Alzheimer's Disease Through Automated Hippocampal Segmentation
Abstract— We compared four automated methods for hippocampal segmentation using different machine learning algorithms (1) hierarchical AdaBoost, (2) Support Vector Machines (SVM)...
Jonathan H. Morra, Zhuowen Tu, Liana G. Apostolova...
TSD
2010
Springer
13 years 5 months ago
Comparison of Different Lemmatization Approaches through the Means of Information Retrieval Performance
This paper presents a quantitative performance analysis of two different approaches to the lemmatization of the Czech text data. The first one is based on manually prepared diction...
Jakub Kanis, Lucie Skorkovská