Sciweavers

3374 search results - page 526 / 675
» Explaining Similarity of Terms
Sort
View
IJNSEC
2006
78views more  IJNSEC 2006»
15 years 4 months ago
Authentication and Key Agreement Protocols Preserving Anonymity
Anonymity is a very important security feature in addition to authentication and key agreement features in communication protocols. In this paper, we propose two authentication an...
Kumar V. Mangipudi, Rajendra S. Katti, Huirong Fu
IJON
2006
95views more  IJON 2006»
15 years 4 months ago
Generalized relevance LVQ (GRLVQ) with correlation measures for gene expression analysis
A correlation-based similarity measure is derived for generalized relevance learning vector quantization (GRLVQ). The resulting GRLVQ-C classifier makes Pearson correlation availa...
Marc Strickert, Udo Seiffert, Nese Sreenivasulu, W...
IJWET
2006
89views more  IJWET 2006»
15 years 4 months ago
Enforcing web services business protocols at run-time: a process-driven approach
: Business processes provide abstractions for modelling business protocols that define the correct interactions between two or more Web services (WS). It has been shown that it is ...
Biörn Biörnstad, Cesare Pautasso, Gustav...
INFORMATICALT
2006
116views more  INFORMATICALT 2006»
15 years 4 months ago
An Agent-Based Best Effort Routing Technique for Load Balancing
Abstract. Several best effort schemes (next-hop routing) are used to transport the data in the Internet. Some of them do not perform flexible route computations to cope up with the...
Sunilkumar S. Manvi, Pallapa Venkataram
CSDA
2007
120views more  CSDA 2007»
15 years 4 months ago
Boosting ridge regression
Ridge regression is a well established method to shrink regression parameters towards zero, thereby securing existence of estimates. The present paper investigates several approac...
Gerhard Tutz, Harald Binder