Sciweavers

2678 search results - page 82 / 536
» Comparative Evaluation of Approaches to Propositionalization
Sort
View
ENVSOFT
2008
120views more  ENVSOFT 2008»
13 years 8 months ago
Extension and evaluation of sensitivity analysis capabilities in a photochemical model
The decoupled direct method in three dimensions (DDM-3D) provides an efficient and accurate approach for probing the sensitivity of atmospheric pollutant concentrations to various...
S. L. Napelenok, D. S. Cohan, M. T. Odman, S. Tons...
IJNSEC
2008
127views more  IJNSEC 2008»
13 years 8 months ago
Reducing Communication Overhead for Wireless Roaming Authentication: Methods and Performance Evaluation
The protocol design for wireless roaming authentication is challenging because of the key management regarding users and home/visited networks. In this paper, we present two authe...
Men Long, Chwan-Hwa John Wu, J. David Irwin
ASAP
2007
IEEE
97views Hardware» more  ASAP 2007»
13 years 10 months ago
FPGA-Based Efficient Design Approach for Large-Size Two's Complement Squarers
This paper presents an optimized design approach of two’s complement large-size squarers using embedded multipliers in FPGAs. The realization is based on BaughWooley’s algorit...
Shuli Gao, Noureddine Chabini, Dhamin Al-Khalili, ...
ICMCS
2010
IEEE
169views Multimedia» more  ICMCS 2010»
13 years 9 months ago
Comparison of clustering approaches for summarizing large populations of images
This paper compares the efficacy and efficiency of different clustering approaches for selecting a set of exemplar images, to present in the context of a semantic concept. We eval...
Yushi Jing, Michele Covell, Henry A. Rowley
CCECE
2006
IEEE
14 years 2 months ago
Software Defect Content Estimation: A Bayesian Approach
Software inspection is a method to detect errors in software artefacts early in the development cycle. At the end of the inspection process the inspectors need to make a decision ...
Achin Jain, Alok R. Patnaik, Pulak Dhar, Vineet Sr...