Sciweavers

1648 search results - page 262 / 330
» On the generation of bicliques of a graph
Sort
View
EDOC
2007
IEEE
14 years 3 months ago
Incorporating Security Behaviour into Business Models Using a Model Driven Approach
There has, in recent years, been growing interest in Model Driven Engineering (MDE), in which models are the primary design artifacts and transformations are applied to these mode...
Peter F. Linington, Pulitha Liyanagama
ICDM
2007
IEEE
159views Data Mining» more  ICDM 2007»
14 years 3 months ago
Incremental Subspace Clustering over Multiple Data Streams
Data streams are often locally correlated, with a subset of streams exhibiting coherent patterns over a subset of time points. Subspace clustering can discover clusters of objects...
Qi Zhang, Jinze Liu, Wei Wang 0010
ICMCS
2007
IEEE
112views Multimedia» more  ICMCS 2007»
14 years 3 months ago
Detecting Unsafe Driving Patterns using Discriminative Learning
We propose a discriminative learning approach for fusing multichannel sequential data with application to detect unsafe driving patterns from multi-channel driving recording data....
Yue Zhou, Wei Xu, Huazhong Ning, Yihong Gong, Thom...
IEEECIT
2007
IEEE
14 years 3 months ago
Overview of LDPC Codes
In light of the history of LDPC codes and relevant research advances in recent years, this paper probes into the encoding and decoding techniques related to this capacity-approach...
Zongjie Tu, Shiyong Zhang
SECON
2007
IEEE
14 years 3 months ago
Minimum Interference Channel Assignment in Multi-Radio Wireless Mesh Networks
—In this paper, we consider multi-hop wireless mesh networks, where each router node is equipped with multiple radio interfaces and multiple channels are available for communicat...
Anand Prabhu Subramanian, Himanshu Gupta, Samir R....