Sciweavers

704 search results - page 41 / 141
» Exploiting Data Missingness in Bayesian Network Modeling
Sort
View
JCP
2008
206views more  JCP 2008»
15 years 2 months ago
SW-R2P: A Trusted Small World Overlay P2P Network with Zero Knowledge Identification
In order to implement both the efficiency and security in the Peer-to-Peer (P2P) network, we design a trusted small world overlay P2P network with the role based and reputation bas...
Yingjie Xia, Guanghua Song, Yao Zheng
110
Voted
SRDS
1996
IEEE
15 years 6 months ago
Exploiting Data-Flow for Fault-Tolerance in a Wide-Area Parallel System
Wide-area parallel processing systems will soon be available to researchers to solve a range of problems. In these systems, it is certain that host failures and other faults will ...
Anh Nguyen-Tuong, Andrew S. Grimshaw, Mark Hyett
142
Voted
CSDA
2007
134views more  CSDA 2007»
15 years 2 months ago
Variational approximations in Bayesian model selection for finite mixture distributions
Variational methods for model comparison have become popular in the neural computing/machine learning literature. In this paper we explore their application to the Bayesian analys...
Clare A. McGrory, D. M. Titterington
113
Voted
ACMSE
2006
ACM
15 years 8 months ago
Reconstructing networks using co-temporal functions
Reconstructing networks from time series data is a difficult inverse problem. We apply two methods to this problem using co-temporal functions. Co-temporal functions capture mathe...
Edward E. Allen, Anthony Pecorella, Jacquelyn S. F...
WCNC
2008
IEEE
15 years 9 months ago
Exploiting Historical Spectrum Occupancy Information for Adaptive Spectrum Sensing
—At present wireless devices are able to select their working frequency only to a limited extend although several measurements have shown that the current spectrum regulations ar...
Matthias Wellens, Alexandre de Baynast, Petri M&au...