نتایج جستجو برای: characteristic based scheme

تعداد نتایج: 3187217  

In this paper I develop a Proxy Means Tests (PMT) model and examine several targeting lines based on 2008 household survey data to identify beneficiaries for a targeting subsidy scheme in Iran. Based on the findings of this study, setting a cut-off percentile of 40% is expected to provide compensation for almost 70 percent of the poorest households. This will result in the highest accuracy main...

Journal: :International Journal of Information Technology and Decision Making 2013
Ling Tang Lean Yu Fangtao Liu Weixuan Xu

491 In this paper, an integrated data characteristic testing scheme is proposed for complex time series data exploration so as to select the most appropriate research methodology for complex time series modeling. Based on relationships across di®erent data characteristics, data characteristics of time series data are divided into two main categories: nature characteristics and pattern character...

2002
Spyridon Panagiotakis Maria Koutsopoulou Athanassia Alonistioti Alexandros Kaloxylos

The provision of location-based services is expected to have essential impact in the competition among 3 Generation network operators. To support the realization of this functionality the standard UMTS infrastructure will probably need to be supplemented with additional intelligent components. Furthermore, flexible Location-based charging mechanisms have to be designed and deployed to allow sub...

Journal: :Int. J. Comput. Math. 2009
Vladimir Bozovic Daniel Socek Rainer Steinwandt Viktória I. Villányi

An attribute based encryption scheme capable of handling multiple authorities was recently proposed by Chase. The scheme is built upon a single-authority attribute based encryption scheme presented earlier by Sahai and Waters. Chase’s construction uses a trusted central authority that is inherently capable of decrypting arbitrary ciphertexts created within the system. We present a multi-authori...

Journal: :Telecommunication Systems 1999
Luca Delgrossi Domenico Ferrari

The definition of an adequate charging scheme for reservation-based multi-service networks and internetworks is one of the key factors destined to influence the wide use and deployment of these networks in the next decades. This paper presents some of the authors' ideas on this subject and is intended to be a framework on which future works in this area can be based. It comprises an approach to...

2005
Jae-Woo Chang Jung-Ho Um Wang-Chien Lee

Because moving objects usually moves on spatial networks, efficient trajectory index structures are required to gain good retrieval performance on their trajectories. However, there has been little research on trajectory index structure for spatial networks, like road networks. In this paper, we propose an efficient trajectory index structure for moving objects in Location-based Services (LBS)....

Journal: :CoRR 2015
Barbara Zogala-Siudem Grzegorz Siudem Anna Cena Marek Gagolewski

The Hirsch’s h-index is perhaps the most popular citation-based measure of the scientific excellence. In 2013 G. Ionescu and B. Chopard proposed an agent-based model for this index to describe a publications and citations generation process in an abstract scientific community. With such an approach one can simulate a single scientist’s activity, and by extension investigate the whole community ...

1999
Derek Magee Roger Boyle

In this paper we present a novel scheme for modelling and tracking complex real life objects. The scheme uses multiple models based on a variation of the Point Distribution Model [1] known as the Vector Distribution Model [2]. Inter and intra-class variation is separated using a variation on Linear Discriminant Analysis known as ‘Delta Analysis’. The tracking scheme is stochastic and is based o...

2001
Jason Cooper Manish Karir John S. Baras

The failure of the 802.11 WEP security specification to provide any reasonable level of security has come under sharp criticism recently. In this paper we propose a novel scheme for providing security in both a basestation based, as well as an ad hoc network environment. Our proposed scheme uses data exchanged between communicating peers to evolve per packet keys. In addition to the concept of ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید