Sciweavers

12536 search results - page 2362 / 2508
» Cardinality Networks and Their Applications
Sort
View
JUCS
2008
149views more  JUCS 2008»
15 years 4 months ago
Formal Security Definition and Efficient Construction for Roaming with a Privacy-Preserving Extension
: In a secure roaming scenario, a user U travels to a foreign network and communicates with a foreign server V securely so that no one other than U and V can obtain the messages ex...
Guomin Yang, Duncan S. Wong, Xiaotie Deng
JIIS
2006
113views more  JIIS 2006»
15 years 4 months ago
Spatial ordering and encoding for geographic data mining and visualization
: Geographic information (e.g., locations, networks, and nearest neighbors) are unique and different from other aspatial attributes (e.g., population, sales, or income). It is a ch...
Diansheng Guo, Mark Gahegan
ENGL
2007
100views more  ENGL 2007»
15 years 4 months ago
Utilizing Computational Intelligence to Assist in Software Release Decision
—Defect tracking using computational intelligence methods is used to predict software readiness in this study. By comparing predicted number of faults and number of faults discov...
Tong-Seng Quah, Mie Mie Thet Thwin
EOR
2007
108views more  EOR 2007»
15 years 4 months ago
Measuring retail company performance using credit scoring techniques
This paper proposes a theoretical framework for predicting financial distress based on Hunt’s (2000) Resource-Advantage Theory of Competition. The study focuses on the US retail...
Yu-Chiang Hu, Jake Ansell
NN
2008
Springer
158views Neural Networks» more  NN 2008»
15 years 4 months ago
Improved mapping of information distribution across the cortical surface with the support vector machine
The early visual cortices represent information of several stimulus attributes, such as orientation and color. To understand the coding mechanisms of these attributes in the brain...
Youping Xiao, Ravi Rao, Guillermo A. Cecchi, Ehud ...
« Prev « First page 2362 / 2508 Last » Next »