Sciweavers

7741 search results - page 1529 / 1549
» Security in Active Networks
Sort
View
BMCBI
2007
209views more  BMCBI 2007»
13 years 10 months ago
SYMBIOmatics: Synergies in Medical Informatics and Bioinformatics - exploring current scientific literature for emerging topics
Background: The SYMBIOmatics Specific Support Action (SSA) is "an information gathering and dissemination activity" that seeks "to identify synergies between the bi...
Dietrich Rebholz-Schuhmann, Graham Cameron, Domini...
CN
2007
123views more  CN 2007»
13 years 10 months ago
Generalized multicast congestion control
Efficient multicast congestion control (MCC) is one of the critical components required to enable the IP multicast deployment over the Internet. Previously proposed MCC schemes ca...
Jiang Li, Murat Yuksel, Xingzhe Fan, Shivkumar Kal...
JSAC
2008
140views more  JSAC 2008»
13 years 10 months ago
Optimality and Complexity of Pure Nash Equilibria in the Coverage Game
In this paper, we investigate the coverage problem in wireless sensor networks using a game theory method. We assume that nodes are randomly scattered in a sensor field and the goa...
Xin Ai, Vikram Srinivasan, Chen-Khong Tham
ESWA
2007
176views more  ESWA 2007»
13 years 10 months ago
Credit scoring with a data mining approach based on support vector machines
The credit card industry has been growing rapidly recently, and thus huge numbers of consumers’ credit data are collected by the credit department of the bank. The credit scorin...
Cheng-Lung Huang, Mu-Chen Chen, Chieh-Jen Wang
AC
2005
Springer
13 years 10 months ago
The state of artificial intelligence
Artificial intelligence has been an active branch of research for computer scientists and psychologists for 50 years. The concept of mimicking human intelligence in a computer fue...
Adrian A. Hopgood
« Prev « First page 1529 / 1549 Last » Next »