Sciweavers

354 search results - page 61 / 71
» jos 2010
Sort
View
TOSN
2010
106views more  TOSN 2010»
13 years 5 months ago
On boundary recognition without location information in wireless sensor networks
Boundary recognition is an important and challenging issue in wireless sensor networks when no coordinates or distances are available. The distinction between inner and boundary n...
Olga Saukh, Robert Sauter, Matthias Gauger, Pedro ...
CEC
2010
IEEE
13 years 5 months ago
A grammar based Ant Programming algorithm for mining classification rules
This paper focuses on the application of a new ACO-based automatic programming algorithm to the classification task of data mining. This new model, called GBAP algorithm, is based ...
Juan Luis Olmo, José Raúl Romero, Se...
CORR
2010
Springer
54views Education» more  CORR 2010»
13 years 4 months ago
Channel Decoding with a Bayesian Equalizer
In this paper we show that, in case of uncertainties during the estimation, overconfident posterior probabilities tend to mislead the performance of soft-decoders. Maximum likeliho...
Luis Salamanca, Juan José Murillo-Fuentes, ...
CHI
2010
ACM
14 years 2 months ago
Using reinforcement to strengthen users' secure behaviors
Users have a strong tendency toward dismissing security dialogs unthinkingly. Prior research has shown that users' responses to security dialogs become significantly more tho...
Ricardo Villamarín-Salomón, Jos&eacu...
ISCA
2010
IEEE
232views Hardware» more  ISCA 2010»
14 years 15 days ago
Data marshaling for multi-core architectures
Previous research has shown that Staged Execution (SE), i.e., dividing a program into segments and executing each segment at the core that has the data and/or functionality to bes...
M. Aater Suleman, Onur Mutlu, José A. Joao,...