Sciweavers

2229 search results - page 320 / 446
» Comparative analysis of biclustering algorithms
Sort
View
DCOSS
2010
Springer
14 years 8 days ago
Wireless Jamming Localization by Exploiting Nodes' Hearing Ranges
Jamming attacks are especially harmful when ensuring the dependability of wireless communication. Finding the position of a jammer will enable the network to actively exploit a wid...
Zhenhua Liu, Hongbo Liu, Wenyuan Xu, Yingying Chen
COMAD
2008
13 years 11 months ago
Concurrency Control in Distributed MRA Index Structure
Answering aggregate queries like sum, count, min, max over regions containing moving objects is often needed for virtual world applications, real-time monitoring systems, etc. Sin...
Neha Singh, S. Sudarshan
LREC
2008
99views Education» more  LREC 2008»
13 years 11 months ago
Characterization of Scientific and Popular Science Discourse in French, Japanese and Russian
We aim to characterize the comparability of corpora, we address this issue in the trilingual context through the distinction of expert and non expert documents. We work separately...
Lorraine Goeuriot, Natalia Grabar, Béatrice...
ISCAPDCS
2007
13 years 11 months ago
A rapid heuristic for scheduling non-preemptive dependent periodic tasks onto multiprocessor
We address distributed real-time applications represented by systems of non-preemptive dependent periodic tasks. This system is described by an acyclic directed graph. Because the...
Omar Kermia, Yves Sorel
AAAI
2006
13 years 11 months ago
Modeling Human Decision Making in Cliff-Edge Environments
In this paper we propose a model for human learning and decision making in environments of repeated Cliff-Edge (CE) interactions. In CE environments, which include common daily in...
Ron Katz, Sarit Kraus