Sciweavers

2900 search results - page 494 / 580
» On the Convergence of Immune Algorithms
Sort
View
MDM
2009
Springer
126views Communications» more  MDM 2009»
14 years 2 months ago
Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory
Mobile Ad-hoc NETworks (MANETs) are known to be vulnerable to a variety of attacks due to lack of central authority or fixed network infrastructure. Many security schemes have bee...
Wenjia Li, Anupam Joshi
JCDL
2009
ACM
162views Education» more  JCDL 2009»
14 years 2 months ago
No bull, no spin: a comparison of tags with other forms of user metadata
User-contributed tags have shown promise as a means of indexing multimedia collections by harnessing the combined efforts and enthusiasm of online communities. But tags are only o...
Catherine C. Marshall
MM
2009
ACM
137views Multimedia» more  MM 2009»
14 years 2 months ago
A method for rapid personalization of audio equalization parameters
Potential users of audio production software, such as audio equalizers, may be discouraged by the complexity of the interface. We describe a system that simplifies the interface b...
Andrew T. Sabin, Bryan Pardo
CISS
2008
IEEE
14 years 2 months ago
Interference management for multiuser two-way relaying
—We consider a multiuser two-way relay network where multiple pairs of users communicate with their pre-assigned partners, using a common intermediate relay node, in a twophase c...
Min Chen, Aylin Yener
FCCM
2008
IEEE
205views VLSI» more  FCCM 2008»
14 years 2 months ago
Credit Risk Modelling using Hardware Accelerated Monte-Carlo Simulation
The recent turmoil in global credit markets has demonstrated the need for advanced modelling of credit risk, which can take into account the effects of changing economic condition...
David B. Thomas, Wayne Luk