Sciweavers

951 search results - page 154 / 191
» The Guidelines of Modeling - An Approach to Enhance the Qual...
Sort
View
ATAL
2010
Springer
13 years 8 months ago
Bootstrapping trust evaluations through stereotypes
In open, dynamic multi-agent systems, agents may form short-term ad-hoc groups, such as coalitions, in order to meet their goals. Trust and reputation are crucial concepts in thes...
Chris Burnett, Timothy J. Norman, Katia P. Sycara
PIMRC
2010
IEEE
13 years 5 months ago
Downlink capacity of two-tier cognitive femto networks
Abstract--In two-tier networks consisting of a macrocell overlaid with femtocells in co-channel deployment and closed-access policy, spatial reuse is achieved at the price of sever...
Shin-Ming Cheng, Weng-Chon Ao, Kwang-Cheng Chen
KDD
2009
ACM
211views Data Mining» more  KDD 2009»
14 years 8 months ago
Address standardization with latent semantic association
Address standardization is a very challenging task in data cleansing. To provide better customer relationship management and business intelligence for customer-oriented cooperates...
Honglei Guo, Huijia Zhu, Zhili Guo, Xiaoxun Zhang,...
AUSAI
2008
Springer
13 years 9 months ago
Character Recognition Using Hierarchical Vector Quantization and Temporal Pooling
In recent years, there has been a cross-fertilization of ideas between computational neuroscience models of the operation of the neocortex and artificial intelligence models of mac...
John Thornton, Jolon Faichney, Michael Blumenstein...
SECURWARE
2008
IEEE
14 years 2 months ago
ToLeRating UR-STD
A new emerging paradigm of Uncertain Risk of Suspicion, Threat and Danger, observed across the field of information security, is described. Based on this paradigm a novel approac...
Jan Feyereisl, Uwe Aickelin