Sciweavers

15351 search results - page 3029 / 3071
» The information bottleneck method
Sort
View
JUCS
2008
143views more  JUCS 2008»
13 years 7 months ago
Market Microstructure Patterns Powering Trading and Surveillance Agents
: Market Surveillance plays important mechanism roles in constructing market models. From data analysis perspective, we view it valuable for smart trading in designing legal and pr...
Longbing Cao, Yuming Ou
JGS
2006
154views more  JGS 2006»
13 years 7 months ago
Area-to-point Kriging with inequality-type data
In practical applications of area-to-point spatial interpolation, inequality constraints, such as non-negativity, or more general constraints on the maximum and/or minimum allowab...
E.-H. Yoo, Phaedon C. Kyriakidis
ENGL
2007
100views more  ENGL 2007»
13 years 7 months ago
Utilizing Computational Intelligence to Assist in Software Release Decision
—Defect tracking using computational intelligence methods is used to predict software readiness in this study. By comparing predicted number of faults and number of faults discov...
Tong-Seng Quah, Mie Mie Thet Thwin
ML
2008
ACM
13 years 7 months ago
Incremental exemplar learning schemes for classification on embedded devices
Although memory-based classifiers offer robust classification performance, their widespread usage on embedded devices is hindered due to the device's limited memory resources...
Ankur Jain, Daniel Nikovski
JSAC
2006
167views more  JSAC 2006»
13 years 7 months ago
Secure and resilient clock synchronization in wireless sensor networks
Abstract--Wireless sensor networks have received a lot of attention recently due to its wide applications. An accurate and synchronized clock time is crucial in many sensor network...
Kun Sun, Peng Ning, Cliff Wang
« Prev « First page 3029 / 3071 Last » Next »