Sciweavers

127 search results - page 15 / 26
» Robust constrained predictive control using comparison model
Sort
View
DBSEC
2008
136views Database» more  DBSEC 2008»
13 years 9 months ago
An Opinion Model for Evaluating Malicious Activities in Pervasive Computing Systems
Pervasive computing applications typically involve cooperation among a number of entities spanning multiple organizations. Any security breach in any single entity can have very fa...
Indrajit Ray, Nayot Poolsappasit, Rinku Dewri
GCB
2010
Springer
204views Biometrics» more  GCB 2010»
13 years 6 months ago
Learning Pathway-based Decision Rules to Classify Microarray Cancer Samples
: Despite recent advances in DNA chip technology current microarray gene expression studies are still affected by high noise levels, small sample sizes and large numbers of uninfor...
Enrico Glaab, Jonathan M. Garibaldi, Natalio Krasn...
AAAI
1997
13 years 9 months ago
The Scaling of Search Cost
We show that a resealed constrainedness parameter provides the basis for accurate numerical models of search cost for both backtracking and local search algorithms. In the past, t...
Ian P. Gent, Ewan MacIntyre, Patrick Prosser, Toby...
EUSFLAT
2009
312views Fuzzy Logic» more  EUSFLAT 2009»
13 years 5 months ago
Forecasting Exchange Rates: A Neuro-Fuzzy Approach
This paper presents an adaptive neuro-fuzzy inference system (ANFIS) for USD/JPY exchange rates forecasting. Previous work often used time series techniques and neural networks (NN...
Meysam Alizadeh, Roy Rada, Akram Khaleghei Ghoshe ...
CORR
2007
Springer
130views Education» more  CORR 2007»
13 years 8 months ago
An Autonomous Distributed Admission Control Scheme for IEEE 802.11 DCF
Admission control as a mechanism for providing QoS requires an accurate description of the requested flow as well as already admitted flows. Since 802.11 WLAN capacity is shared...
Preetam Patil, Varsha Apte