Sciweavers

8068 search results - page 1609 / 1614
» Java Data Objects
Sort
View
CORR
2010
Springer
171views Education» more  CORR 2010»
13 years 2 months ago
Online Learning in Opportunistic Spectrum Access: A Restless Bandit Approach
We consider an opportunistic spectrum access (OSA) problem where the time-varying condition of each channel (e.g., as a result of random fading or certain primary users' activ...
Cem Tekin, Mingyan Liu
JCIT
2010
156views more  JCIT 2010»
13 years 2 months ago
Intelligent Monitoring Approach for Pipeline Defect Detection from MFL Inspection
Artificial Neural Networks(ANNS) have top level of capability to progress the estimation of cracks in metal tubes. The aim of this paper is to propose an algorithm to identify mod...
Saeedreza Ehteram, Seyed Zeinolabedin Moussavi, Mo...
JOCN
2010
79views more  JOCN 2010»
13 years 2 months ago
Neural Activity in the Hippocampus and Perirhinal Cortex during Encoding Is Associated with the Durability of Episodic Memory
Studies examining medial temporal lobe (MTL) involvement in memory formation typically assess memory performance after a single, short delay. Thus, the relationship between MTL en...
Valerie A. Carr, Indre V. Viskontas, Stephen A. En...
JUCS
2010
152views more  JUCS 2010»
13 years 2 months ago
Compositional Semantics of Dataflow Networks with Query-Driven Communication of Exact Values
: We develop and study the concept of dataflow process networks as used for example by Kahn to suit exact computation over data types related to real numbers, such as continuous fu...
Michal Konecný, Amin Farjudian
TCIAIG
2010
13 years 2 months ago
Game Bot Detection via Avatar Trajectory Analysis
The objective of this work is to automatically detect the use of game bots in online games based on the trajectories of account users. Online gaming has become one of the most popu...
Hsing-Kuo Pao, Kuan-Ta Chen, Hong-Chung Chang
« Prev « First page 1609 / 1614 Last » Next »