Sciweavers

926 search results - page 150 / 186
» A new extension of fuzzy sets using rough sets: R-fuzzy sets
Sort
View
ISDA
2009
IEEE
14 years 2 months ago
From Local Patterns to Global Models: Towards Domain Driven Educational Process Mining
Educational process mining (EPM) aims at (i) constructing complete and compact educational process models that are able to reproduce all observed behavior (process model discovery...
Nikola Trcka, Mykola Pechenizkiy
WASA
2009
Springer
107views Algorithms» more  WASA 2009»
14 years 2 months ago
Relative Span Weighted Localization of Uncooperative Nodes in Wireless Networks
Abstract. Increasingly ubiquitous wireless technologies require novel localization techniques to pinpoint the position of an uncooperative node, whether the target be a malicious d...
Christine Laurendeau, Michel Barbeau
INFOCOM
2008
IEEE
14 years 1 months ago
iLOC: An invisible LOCalization Attack to Internet Threat Monitoring Systems
—In this paper, we study a new class of attacks, the invisible LOCalization (iLOC) attack, which can accurately and invisibly localize monitors of Internet threat monitoring (ITM...
Xun Wang, Wei Yu, Xinwen Fu, Dong Xuan, Wei Zhao
PIMRC
2008
IEEE
14 years 1 months ago
Engineering wireless mesh networks
Abstract—Wireless mesh networks are considered as a potential attractive alternative to provide broadband access to users. They have been studied extensively by the research comm...
Catherine Rosenberg, Jun Luo, André Girard
AUSDM
2007
Springer
131views Data Mining» more  AUSDM 2007»
14 years 1 months ago
A Bottom-Up Projection Based Algorithm for Mining High Utility Itemsets
Mining High Utility Itemsets from a transaction database is to find itemsests that have utility above a user-specified threshold. This problem is an extension of Frequent Itemset ...
Alva Erwin, Raj P. Gopalan, N. R. Achuthan