Sciweavers

18 search results - page 3 / 4
» cj 2004
Sort
View
CJ
2004
90views more  CJ 2004»
13 years 7 months ago
Extended k-Nearest Neighbours based on Evidence Theory
An evidence theoretic classification method is proposed in this paper. In order to classify a pattern we consider its neighbours, which are taken as parts of a single source of ev...
Hui Wang, David A. Bell
CJ
2004
99views more  CJ 2004»
13 years 7 months ago
On the Connectivity of Ad Hoc Networks
We study the effects of physical layer parameters on the connectivity of fading wireless ad-hoc networks. Relying on a symbol error rate connectivity metric for wireless ad-hoc net...
Christian Bettstetter
CJ
2004
99views more  CJ 2004»
13 years 7 months ago
Filters for XML-based Service Discovery in Pervasive Computing
Pervasive computing refers to an emerging trend towards numerous casually accessible devices connected to an increasingly ubiquitous network infrastructure. An important challenge...
Georgia Koloniari, Evaggelia Pitoura
CJ
2004
141views more  CJ 2004»
13 years 7 months ago
Modeling and Analysis of a Scheduled Maintenance System: a DSPN Approach
This paper describes a way to manage the modeling and analysis of Scheduled Maintenance Systems (SMS) within an analytically tractable context. We chose a significant case study h...
Andrea Bondavalli, Roberto Filippini
CJ
2004
105views more  CJ 2004»
13 years 7 months ago
Generalized Template Splay: A Basic Theory and Calculus
act interpretation. R. Barbuti, C. Bernardeschi and N. De Francesco With mobile technology more and more prominent, the problem of security leakages becomes more and more important...
George F. Georgakopoulos, David J. McClurkin