Sciweavers

7522 search results - page 1098 / 1505
» Spacing memetic algorithms
Sort
View
163
Voted
IDEAS
2006
IEEE
98views Database» more  IDEAS 2006»
15 years 10 months ago
PAID: Mining Sequential Patterns by Passed Item Deduction in Large Databases
Sequential pattern mining is very important because it is the basis of many applications. Yet how to efficiently implement the mining is difficult due to the inherent characteri...
Zhenglu Yang, Masaru Kitsuregawa, Yitong Wang
INFOCOM
2006
IEEE
15 years 10 months ago
A Client-Driven Approach for Channel Management in Wireless LANs
— We propose an efficient client-based approach for channel management (channel assignment and load balancing) in 802.11-based WLANs that lead to better usage of the wireless sp...
Arunesh Mishra, Vladimir Brik, Suman Banerjee, Ara...
ISCAS
2006
IEEE
154views Hardware» more  ISCAS 2006»
15 years 10 months ago
A novel Fisher discriminant for biometrics recognition: 2DPCA plus 2DFLD
— this paper presents a novel image feature extraction and recognition method two dimensional linear discriminant analysis (2DLDA) in a much smaller subspace. Image representatio...
R. M. Mutelo, Li Chin Khor, Wai Lok Woo, Satnam Si...
SRDS
2006
IEEE
15 years 10 months ago
AVCast : New Approaches For Implementing Availability-Dependent Reliability for Multicast Receivers
Today’s large-scale distributed systems consist of collections of nodes that have highly variable availability — a phenomenon sometimes called churn. This availability variati...
Thadpong Pongthawornkamol, Indranil Gupta
SSDBM
2006
IEEE
111views Database» more  SSDBM 2006»
15 years 10 months ago
Efficient Data Harvesting for Tracing Phenomena in Sensor Networks
Many publisWsubscribe systems have been built using wireless sensor networks, WSNs, deployedfor real-world environmentaldata collection, securitymonitoring,and object tracking. Ho...
Adesola Omotayo, Moustafa A. Hammad, Ken Barker
« Prev « First page 1098 / 1505 Last » Next »