Sciweavers

1822 search results - page 59 / 365
» The Method of Assigning Incidences
Sort
View
NSPW
2006
ACM
14 years 3 months ago
E-Prime for security: a new security paradigm
This paper details a true and striking paradigm shift: the use of E-Prime for (at least) user-centered security, organizational/enterprise security policies and informal security ...
Steven J. Greenwald
WCE
2007
13 years 11 months ago
The Dynamic Spatial Disaggregation Approach: A Spatio-Temporal Modelling of Crime
— The spatio-temporal modelling and forecasting of incidences of crimes have now become a routine part of crime prevention operations. However, obtaining reliable forecasts for c...
Christian Ivaha, Hasan Al-Madfai, Gary Higgs, J. A...
CORR
2010
Springer
172views Education» more  CORR 2010»
13 years 10 months ago
The MUSIC Algorithm for Sparse Objects: A Compressed Sensing Analysis
The MUSIC algorithm, and its extension for imaging sparse extended objects, with noisy data is analyzed by compressed sensing (CS) techniques. A thresholding rule is developed to a...
Albert Fannjiang
EDBT
2008
ACM
167views Database» more  EDBT 2008»
14 years 10 months ago
HISSCLU: a hierarchical density-based method for semi-supervised clustering
In situations where class labels are known for a part of the objects, a cluster analysis respecting this information, i.e. semi-supervised clustering, can give insight into the cl...
Christian Böhm, Claudia Plant
SETN
2004
Springer
14 years 3 months ago
Inherent Choice in the Search Space of Constraint Satisfaction Problem Instances
Abstract. Constructive methods obtain solutions to constraint satisfaction problem instances by iteratively extending consistent partial assignments. In this research, we study the...
George Boukeas, Panagiotis Stamatopoulos, Constant...