Sciweavers

3717 search results - page 617 / 744
» The Persistence of Statistical Information
Sort
View
COMCOM
2004
102views more  COMCOM 2004»
13 years 7 months ago
The distinctive design characteristic of a wireless sensor network: the energy map
The key challenge in the design of a wireless sensor network is maximizing its lifetime. This is a fundamental problem and new protocol engineering principles need to be establish...
Raquel A. F. Mini, Antonio Alfredo Ferreira Lourei...
CORR
2002
Springer
121views Education» more  CORR 2002»
13 years 7 months ago
Answering Subcognitive Turing Test Questions: A Reply to French
Robert French has argued that a disembodied computer is incapable of passing a Turing Test that includes subcognitive questions. Subcognitive questions are designed to probe the n...
Peter D. Turney
DATAMINE
2002
125views more  DATAMINE 2002»
13 years 7 months ago
High-Performance Commercial Data Mining: A Multistrategy Machine Learning Application
We present an application of inductive concept learning and interactive visualization techniques to a large-scale commercial data mining project. This paper focuses on design and c...
William H. Hsu, Michael Welge, Thomas Redman, Davi...
EOR
2002
165views more  EOR 2002»
13 years 7 months ago
Review of ranking methods in the data envelopment analysis context
Within data envelopment analysis (DEA) is a sub-group of papers in which many researchers have sought to improve the differential capabilities of DEA and to fully rank both effici...
Nicole Adler, Lea Friedman, Zilla Sinuany-Stern
COMPSEC
2002
185views more  COMPSEC 2002»
13 years 7 months ago
A framework for understanding and predicting insider attacks
In this paper an insider attack is considered to be deliberate misuse by those who are authorized to use computers and networks. Applying this definition in real-life settings to ...
E. Eugene Schultz