Sciweavers

567 search results - page 85 / 114
» On the complexity of constrained VC-classes
Sort
View
EDUTAINMENT
2008
Springer
13 years 9 months ago
Knowledge Discovery by Network Visualization
Hyperlinks among webpages are very important information and are widely used for webpage clustering and webpage ranking. With the explosive growth in the number of webpages availab...
Hong Zhou, Yingcai Wu, Ming-Yuen Chan, Huamin Qu, ...
DBSEC
2008
136views Database» more  DBSEC 2008»
13 years 9 months ago
An Opinion Model for Evaluating Malicious Activities in Pervasive Computing Systems
Pervasive computing applications typically involve cooperation among a number of entities spanning multiple organizations. Any security breach in any single entity can have very fa...
Indrajit Ray, Nayot Poolsappasit, Rinku Dewri
NIPS
2008
13 years 9 months ago
Hierarchical Semi-Markov Conditional Random Fields for Recursive Sequential Data
Inspired by the hierarchical hidden Markov models (HHMM), we present the hierarchical semi-Markov conditional random field (HSCRF), a generalisation of embedded undirected Markov ...
Tran The Truyen, Dinh Q. Phung, Hung Hai Bui, Svet...
SIMUTOOLS
2008
13 years 9 months ago
Implementing MAC protocols for cooperative relaying: a compiler-assisted approach
Evaluating the performance of a cooperative relaying protocol requires an implementation for simulators and/or software-defined radios (SDRs) with an appropriate model for error d...
Hermann S. Lichte, Stefan Valentin
OWLED
2007
13 years 9 months ago
Lege Feliciter: Using Structured English to represent a Topographic Hydrology Ontology
: The mathematical nature of description logics has meant that domain experts find it hard to understand. This forms a significant impediment to the creation and adoption of ontolo...
Glen Hart, Catherine Dolbear, John Goodwin