Sciweavers

2192 search results - page 406 / 439
» Plumbing and Other Utilities
Sort
View
WICON
2008
13 years 10 months ago
Security vulnerabilities in IEEE 802.22
Cognitive Radio (CR) is seen as one of the enabling technologies for realizing a new spectrum access paradigm, viz. Opportunistic Spectrum Sharing (OSS). IEEE 802.22 is the world&...
Kaigui Bian, Jung Min Park
DLOG
2004
13 years 10 months ago
Towards Explaining Semantic Matching
Interoperability among systems using different term vocabularies requires mappings between them. Matching applications generate these mappings. When the matching process utilizes ...
Deborah L. McGuinness, Pavel Shvaiko, Fausto Giunc...
FLAIRS
2004
13 years 10 months ago
An Application of Neural Networks to Sequence Analysis and Genre Identification
This study borrowed sequence analysis techniques from the genetic sciences and applied them to a similar problem in email filtering and web searching. Genre identification is the ...
David Bisant
EUSFLAT
2001
180views Fuzzy Logic» more  EUSFLAT 2001»
13 years 10 months ago
Fuzzy approach to meta-analysis
Meta-analysis is a statistical procedure to do syntheses of evidences. In the production of scientific knowledge, in spite of paradigmatic skips of quality, the rising of the accu...
Paulo Alfonso Bracarense Costa, Rogério Cid...
NETWORKING
2004
13 years 10 months ago
Pricing Differentiated Services: A Game-Theoretic Approach
The goal of this paper is to study pricing of differentiated services and its impact on the choice of service priority at equilibrium. We consider both TCP connections as well as n...
Eitan Altman, Dhiman Barman, Rachid El Azouzi, Dav...