Sciweavers

1799 search results - page 278 / 360
» Design considerations for MRAM
Sort
View
CSDA
2007
106views more  CSDA 2007»
15 years 4 months ago
Parsimonious additive models
A new method for function estimation and variable selection, specifically designed for additive models fitted by cubic splines is proposed.This new method involves regularizing ...
Marta Avalos, Yves Grandvalet, Christophe Ambroise
JSA
2008
81views more  JSA 2008»
15 years 4 months ago
Improving stability for peer-to-peer multicast overlays by active measurements
The instability of the tree-like multicast overlay caused by nodes' abrupt departures is considered as one of the major problems for peer-to-peer (P2P) multicast systems. In ...
Ye Tian, Di Wu, Guangzhong Sun, Kam-Wing Ng
JCSS
2006
102views more  JCSS 2006»
15 years 4 months ago
Password-based authentication and key distribution protocols with perfect forward secrecy
In an open networking environment, a workstation usually needs to identify its legal users for providing its services. Kerberos provides an efficient approach whereby a trusted th...
Hung-Min Sun, Her-Tyan Yeh
PR
2008
131views more  PR 2008»
15 years 4 months ago
A memetic algorithm for evolutionary prototype selection: A scaling up approach
Prototype selection problem consists of reducing the size of databases by removing samples that are considered noisy or not influential on nearest neighbour classification tasks. ...
Salvador García, José Ramón C...
PERVASIVE
2006
Springer
15 years 4 months ago
The Smart Tachograph - Individual Accounting of Traffic Costs and Its Implications
Today, several costs caused by road traffic may either be only roughly approximated, or cannot be clearly assigned to the drivers causing them, or both. They are typically distribu...
Vlad Coroama