Sciweavers

2084 search results - page 346 / 417
» Knowledge Exploitation from the Web
Sort
View
ITNG
2010
IEEE
13 years 7 months ago
Record Setting Software Implementation of DES Using CUDA
—The increase in computational power of off-the-shelf hardware offers more and more advantageous tradeoffs among efficiency, cost and availability, thus enhancing the feasibil...
Giovanni Agosta, Alessandro Barenghi, Fabrizio De ...
JSAC
2010
130views more  JSAC 2010»
13 years 7 months ago
Distributed target tracking using signal strength measurements by a wireless sensor network
Abstract—Wireless Sensor Networks are well suited for tracking targets carrying RFID tags in indoor environments. Tracking based on the received signal strength indication (RSSI)...
Anand Oka, Lutz H.-J. Lampe
WINET
2010
147views more  WINET 2010»
13 years 7 months ago
Hybrid trust and reputation management for sensor networks
Wireless sensor networks are characterised by the distributed nature of their operation and the resource constraints on the nodes. Trust management schemes that are targeted at sen...
Efthimia Aivaloglou, Stefanos Gritzalis
AAAI
2010
13 years 7 months ago
Latent Class Models for Algorithm Portfolio Methods
Different solvers for computationally difficult problems such as satisfiability (SAT) perform best on different instances. Algorithm portfolios exploit this phenomenon by predicti...
Bryan Silverthorn, Risto Miikkulainen
EDM
2009
120views Data Mining» more  EDM 2009»
13 years 7 months ago
Improving Student Question Classification
Students in introductory programming classes often articulate their questions and information needs incompletely. Consequently, the automatic classification of student questions to...
Cecily Heiner, Joseph L. Zachary