Sciweavers

719 search results - page 39 / 144
» What HMMs Can Do
Sort
View
ADHOCNETS
2009
Springer
14 years 4 months ago
Buckshot Routing - A Robust Source Routing Protocol for Dense Ad-Hoc Networks
Experiments with wireless sensor networks have shown that unidirectional communication links are quite common. What is even more, they have also shown that the range of a unidirect...
David Peters, Reinhardt Karnapke, Jörg Nolte
ICDM
2008
IEEE
117views Data Mining» more  ICDM 2008»
14 years 4 months ago
RTM: Laws and a Recursive Generator for Weighted Time-Evolving Graphs
How do real, weighted graphs change over time? What patterns, if any, do they obey? Earlier studies focus on unweighted graphs, and, with few exceptions, they focus on static snap...
Leman Akoglu, Mary McGlohon, Christos Faloutsos
ISI
2005
Springer
14 years 3 months ago
Link Analysis Tools for Intelligence and Counterterrorism
Association rule mining is an important data analysis tool that can be applied with success to a variety of domains. However, most association rule mining algorithms seek to discov...
Antonio Badia, Mehmed M. Kantardzic
SIGCSE
2008
ACM
110views Education» more  SIGCSE 2008»
13 years 10 months ago
Innovating our self image
ion." These images do not foster collaboration with other fields and do not excite the curiosity of young people. In this session, Astrachan and Denning will discuss what they...
Owen L. Astrachan, Peter J. Denning
AGILEDC
2007
IEEE
14 years 4 months ago
A Strategy for Balancing Business Value and Story Size
What would your Analyst team do when torn between meeting Customer versus Developer demands? When their needs conflict with one another, how do you appease them both? The report o...
Hai Ton