Sciweavers

3092 search results - page 595 / 619
» Where are you pointing
Sort
View
ISI
2006
Springer
13 years 7 months ago
An Embedded Bayesian Network Hidden Markov Model for Digital Forensics
In the paper we combine a Bayesian Network model for encoding forensic evidence during a given time interval with a Hidden Markov Model (EBN-HMM) for tracking and predicting the de...
Olivier Y. de Vel, Nianjun Liu, Terry Caelli, Tib&...
JNW
2008
177views more  JNW 2008»
13 years 7 months ago
Design and Evaluation of a Novel HIP-Based Network Mobility Protocol
The rapid growth of IP-based mobile telecommunication technologies in the past few years has revealed situations where not only a single node but an entire network moves and change...
Szabolcs Nováczki, László Bok...
JUCS
2008
120views more  JUCS 2008»
13 years 7 months ago
Guaranteeing Seamless Mobility with User Redials and Automatic Handover Retrials
: In communication systems that guarantee seamless mobility of users across service areas, repeated attempts occur as a result of user behavior but also as automatic retries of blo...
José Manuel Giménez-Guzmán, M...
JMIV
2006
124views more  JMIV 2006»
13 years 7 months ago
Segmentation of a Vector Field: Dominant Parameter and Shape Optimization
Vector field segmentation methods usually belong to either of three classes: methods which segment regions homogeneous in direction and/or norm, methods which detect discontinuiti...
Tristan Roy, Eric Debreuve, Michel Barlaud, Gilles...
LOGCOM
2008
104views more  LOGCOM 2008»
13 years 7 months ago
Testing the Reasoning for Question Answering Validation
Question Answering (QA) is a task that deserves more collaboration between Natural Language Processing (NLP) and Knowledge Representation (KR) communities, not only to introduce r...
Anselmo Peñas, Álvaro Rodrigo, Valen...