Sciweavers

1456 search results - page 260 / 292
» Keeping encountered information
Sort
View
CACM
2006
102views more  CACM 2006»
13 years 10 months ago
Infoglut
whose titles and abstracts sound very interesting, the pile of unread reports continues to grow on the table in my office." (How quaint the terminology: mail and electronic me...
Peter J. Denning
IJSNET
2008
126views more  IJSNET 2008»
13 years 10 months ago
Reliable and energy-efficient routing protocol in dense wireless sensor networks
Delivering sensed data to the sink reliably in sensor networks calls for a scalable, energy-efficient, and error-resilient routing solution. In this paper, a reliable energy-effic...
Min Chen, Taekyoung Kwon, Shiwen Mao, Yong Yuan, V...
ENGL
2007
101views more  ENGL 2007»
13 years 10 months ago
Multiresolution Knowledge Mining using Wavelet Transform
— Most research in Knowledge Mining deal with the basic models like clustering, classification, regression, association rule mining and so on. In the process of quest for knowled...
R. Pradeep Kumar, P. Nagabhushan
ENTCS
2007
168views more  ENTCS 2007»
13 years 10 months ago
Bytecode Rewriting in Tom
In this paper, we present a term rewriting based library for manipulating Java bytecode. We define a mapping from bytecode programs to algebraic terms, and we use Tom, an extensi...
Emilie Balland, Pierre-Etienne Moreau, Antoine Rei...
JUCS
2006
141views more  JUCS 2006»
13 years 10 months ago
Constraint Based Methods for Biological Sequence Analysis
: The need for processing biological information is rapidly growing, owing to the masses of new information in digital form being produced at this time. Old methodologies for proce...
Maryam Bavarian, Verónica Dahl