Sciweavers

1929 search results - page 336 / 386
» An Approach to Limit the Wynot Problem
Sort
View
FUZZIEEE
2007
IEEE
14 years 3 months ago
Tolerance-based and Fuzzy-Rough Feature Selection
— One of the main obstacles facing the application of computational intelligence technologies in pattern recognition (and indeed in many other tasks) is that of dataset dimension...
Richard Jensen, Qiang Shen
ICC
2007
IEEE
14 years 3 months ago
Low-Complexity, Low-Memory EMS Algorithm for Non-Binary LDPC Codes
— In this paper, we propose a new implementation of the EMS decoder for non binary LDPC codes presented in [7]. A particularity of the new algorithm is that it takes into account...
Adrian Voicila, David Declercq, François Ve...
ICDE
2007
IEEE
144views Database» more  ICDE 2007»
14 years 3 months ago
Control Theory: a Foundational Technique for Self Managing Databases
Control theory is a well established discipline that has emerged from aeronautical, electrical, and mechanical engineering to provide a formal approach to building robust systems....
Sam Lightstone, Maheswaran Surendra, Yixin Diao, S...
ICPADS
2007
IEEE
14 years 3 months ago
A forwarding model for Voronoi-based Overlay Network
One recent approach to build highly scalable and robust networked virtual environments (NVEs) is by using peer-to-peer overlay networks. Voronoi-based Overlay Network (VON) has be...
Jui-Fa Chen, Wei-Chuan Lin, Tsu-Han Chen, Shun-Yun...
MMM
2007
Springer
114views Multimedia» more  MMM 2007»
14 years 3 months ago
Mining Multiple Visual Appearances of Semantics for Image Annotation
This paper investigates the problem of learning the visual semantics of keyword categories for automatic image annotation. Supervised learning algorithms which learn only a single ...
Hung-Khoon Tan, Chong-Wah Ngo