Sciweavers

24529 search results - page 4866 / 4906
» Computing on Authenticated Data
Sort
View
JUCS
2006
117views more  JUCS 2006»
13 years 10 months ago
Resource Efficient Maintenance of Wireless Network Topologies
Abstract: Multiple hop routing in mobile ad hoc networks can minimize energy consumption and increase data throughput. Yet, the problem of radio interferences remain. However if th...
Tamás Lukovszki, Christian Schindelhauer, K...
MCS
2006
Springer
13 years 10 months ago
A phase-field method for interface-tracking simulation of two-phase flows
For interface-tracking simulation of two-phase flows, we propose a new computational method, NS-PFM, combining Navier-Stokes (NS) equations with phase-field model (PFM). Based on ...
Naoki Takada, Masaki Misawa, Akio Tomiyama
ML
2006
ACM
143views Machine Learning» more  ML 2006»
13 years 9 months ago
Mathematical applications of inductive logic programming
The application of Inductive Logic Programming to scientific datasets has been highly successful. Such applications have led to breakthroughs in the domain of interest and have dri...
Simon Colton, Stephen Muggleton
PAMI
2008
161views more  PAMI 2008»
13 years 9 months ago
TRUST-TECH-Based Expectation Maximization for Learning Finite Mixture Models
The Expectation Maximization (EM) algorithm is widely used for learning finite mixture models despite its greedy nature. Most popular model-based clustering techniques might yield...
Chandan K. Reddy, Hsiao-Dong Chiang, Bala Rajaratn...
PAMI
2008
145views more  PAMI 2008»
13 years 9 months ago
Latent-Space Variational Bayes
Variational Bayesian Expectation-Maximization (VBEM), an approximate inference method for probabilistic models based on factorizing over latent variables and model parameters, has ...
JaeMo Sung, Zoubin Ghahramani, Sung Yang Bang
« Prev « First page 4866 / 4906 Last » Next »