Sciweavers

JCST
2008
109views more  JCST 2008»
13 years 11 months ago
WWW Business Applications Based on the Cellular Model
A cellular model based on the Incrementally Modular Abstraction Hierarchy (IMAH) is a novel model that can represent the architecture of and changes in cyberworlds, preserving inva...
Toshio Kodama, Tosiyasu L. Kunii, Yoichi Seki
JCST
2008
119views more  JCST 2008»
13 years 11 months ago
Mining Frequent Generalized Itemsets and Generalized Association Rules Without Redundancy
This paper presents some new algorithms to efficiently mine max frequent generalized itemsets (g-itemsets) and essential generalized association rules (g-rules). These are compact ...
Daniel Kunkle, Donghui Zhang, Gene Cooperman
JCST
2008
90views more  JCST 2008»
13 years 11 months ago
Proper Reparametrization of Rational Ruled Surface
In this paper, we present a proper reparametrization algorithm for rational ruled surfaces. That is, for an improper rational parametrization of a ruled surface, we construct a pro...
Jia Li, Liyong Shen, Xiao-Shan Gao
JCST
2008
144views more  JCST 2008»
13 years 11 months ago
Beacon-Less Geographic Routing in Real Wireless Sensor Networks
Geographic Routing (GR) algorithms, require nodes to periodically transmit HELLO messages to allow neighbors know their positions (beaconing mechanism). Beacon-less routing algorit...
Juan A. Sánchez, Rafael Marín-P&eacu...
JCST
2008
134views more  JCST 2008»
13 years 11 months ago
Orthogonal Methods Based Ant Colony Search for Solving Continuous Optimization Problems
Research into ant colony algorithms for solving continuous optimization problems forms one of the most significant and promising areas in swarm computation. Although traditional an...
Xiaomin Hu, Jun Zhang, Yun Li
JCST
2008
120views more  JCST 2008»
13 years 11 months ago
Generic Transformation from Weakly to Strongly Unforgeable Signatures
Current techniques for transforming unforgeable signature schemes (the forged message has never been signed) to strongly unforgeable ones (the forged message could have been signed...
Qiong Huang, Duncan S. Wong, Jin Li, Yiming Zhao
JCST
2008
121views more  JCST 2008»
13 years 11 months ago
Clustering Text Data Streams
Abstract Clustering text data streams is an important issue in data mining community and has a number of applications such as news group filtering, text crawling, document organiza...
Yubao Liu, Jiarong Cai, Jian Yin, Ada Wai-Chee Fu
JCST
2008
140views more  JCST 2008»
13 years 11 months ago
ROPAS: Cross-Layer Cognitive Architecture for Mobile UWB Networks
The allocation of bandwidth to unlicensed users, without significantly increasing the interference on the existing licensed users, is a challenge for Ultra Wideband (UWB) networks....
Chittabrata Ghosh, Bin Xie, Dharma P. Agrawal
JCST
2008
159views more  JCST 2008»
13 years 11 months ago
Coordinated Workload Scheduling in Hierarchical Sensor Networks for Data Fusion Applications
To minimize the execution time of a sensing task over a multi-hop hierarchical sensor network, we present a coordinated scheduling method following the divisible load scheduling p...
Xiao-Lin Li, Jiannong Cao