Sciweavers

JCIT
2010
115views more  JCIT 2010»
13 years 6 months ago
The Recognition Method of Unknown Chinese Words in Fragments Based on Mutual Information
This paper presents a method of using mutual information to improve the recognition algorithm of unknown Chinese words, it can resolve the complexity of weight settings and the in...
Qian Zhu, Xian-Yi Cheng, Zi-juan Gao
JCIT
2010
113views more  JCIT 2010»
13 years 6 months ago
Dynamic Integrated Algorithm for Production Scheduling Based on Iterative Search
It is quite difficult to adapt to the changing production scheduling problem for an algorithm of a certain question. According to this, a strategy of dynamic integrated iterative ...
Cunli Song, Xiaobing Liu, Wei Wang, Ming Huang
JCIT
2010
162views more  JCIT 2010»
13 years 6 months ago
Call Admission Control Strategy for System Throughput Maximization Using DOVE
In this paper we propose a signal-to-interference (SIR)-based distributed Call Admission Control (CAC) strategy that considers the combined effect of both call and packet level qu...
Tanzilah Noor Shabnam, Md. Imdadul Islam, M. R. Am...
JCIT
2010
130views more  JCIT 2010»
13 years 6 months ago
Dynamic Relationship of Two Exchange Rate Market Returns' Volatility with an European Dollars Factor: Empirical Study of Japan a
This paper uses the data of Japan's and Korea's exchange rates to discuss the model construction and their associations between Japan's and Korea's terms excha...
Wann-Jyi Horng
JCIT
2010
98views more  JCIT 2010»
13 years 6 months ago
Reliability Analysis of the MAP/M/c Queue with Server Breakdowns
We consider the MAP/M/c queue with markovian flow of breakdowns. There are K waiting positions for arrival customers in the system. The system we consider comprises c servers, of ...
Zonghao Zhou, Yijuan Zhu
JCIT
2010
106views more  JCIT 2010»
13 years 6 months ago
An Appropriate Violation Detection Scenario for Service Level Agreements Based on WS-Agreement Protocol
Nahid Amani, Pedram Hajipour, Farzaneh Seyedmostaf...
JCIT
2010
127views more  JCIT 2010»
13 years 6 months ago
Influence of Philanthropy Donation on Competitive Advantage: From the Perspective of Corporate Social Capital
As an effective way to share corporate social responsibility, corporate donation comes forth rapidly and has become a tendency. Based on the relative study, we construct the theor...
Xueying Tian
JCIT
2010
149views more  JCIT 2010»
13 years 6 months ago
People Summarization by Combining Named Entity Recognition and Relation Extraction
The two most important tasks in entity information summarization from the Web are named entity recognition and relation extraction. Little work has been done toward an integrated ...
Xiaojiang Liu, Nenghai Yu
JCIT
2010
106views more  JCIT 2010»
13 years 6 months ago
Assessment of Home Networking Research Trends, 1981-2009
The objective of this paper explores a bibliometric approach to quantitatively evaluating the characteristics in the research aspect of home networking, retrieving the related lit...
Chi-Yen Yin, Jiann-Min Yang