Sciweavers

461 search results - page 67 / 93
» Fundamentals of concern manipulation
Sort
View
HIS
2003
13 years 9 months ago
Evolving Better Stoplists for Document Clustering and Web Intelligence
: Text classification, document clustering and similar document analysis tasks are currently the subject of significant global research, since such areas underpin web intelligence,...
Mark P. Sinka, David Corne
ADHOC
2007
101views more  ADHOC 2007»
13 years 7 months ago
Searching strategies for target discovery in wireless networks
— In this paper, we address a fundamental problem concerning the optimal searching strategy in terms of searching cost for the target discovery problem in wireless networks. In o...
Zhao Cheng, Wendi B. Heinzelman
ANOR
2007
180views more  ANOR 2007»
13 years 7 months ago
Ethics in OR/MS: past, present and future
Abstract The pervasiveness and impact on society and on every day human life of technology has led to a growing awareness that science and technology cannot be considered above or ...
Jean-Pierre Brans, Giorgio Gallo
ISI
2008
Springer
13 years 7 months ago
Identity management architecture
Identity Management plays a crucial role in many application contexts, including e-governments, e-commerce, business intelligence, investigation, and homeland security. The variet...
Uwe Glässer, Mona Vajihollahi
JCIT
2008
112views more  JCIT 2008»
13 years 7 months ago
On the design of metric relations
Metric distances and the more general concept of dissimilarities are widely used tools in instance-based learning methods and very especially in the nearestneighbor classification...
Lluís Belanche, Jorge Orozco