Sciweavers

311 search results - page 38 / 63
» A Novel Privacy Enhancing Algorithm for Biometric System
Sort
View
ISI
2004
Springer
15 years 6 months ago
Semantic Analysis for Monitoring Insider Threats
Malicious insiders’ difficult-to-detect activities pose serious threats to the intelligence community (IC) when these activities go undetected. A novel approach that integrates ...
Svetlana Symonenko, Elizabeth D. Liddy, Ozgur Yilm...
ESWA
2006
102views more  ESWA 2006»
15 years 1 months ago
A study of Taiwan's issuer credit rating systems using support vector machines
By providing credit risk information, credit rating systems benefit most participants in financial markets, including issuers, investors, market regulators and intermediaries. In ...
Wun-Hwa Chen, Jen-Ying Shih
JSAC
2000
96views more  JSAC 2000»
15 years 1 months ago
Joint equalization and interference suppression for high data rate wireless systems
Enhanced Data Rates for Global Evolution (EDGE) is currently being standardized as an evolution of GSM in Europe and of IS-136 in the United States as an air interface for high spe...
Sirikiat Lek Ariyavisitakul, Jack H. Winters, Nels...
ICASSP
2011
IEEE
14 years 5 months ago
Low-complexity detection of golden codes in LDPC-coded OFDM systems
Recent and next-generation wireless broadcasting standards, such as DVB-T2 or DVB-NGH, are considering distributed multi-antenna transmission in order to increase bandwidth effic...
Iker Sobron, Maitane Barrenechea, Pello Ochandiano...
GECCO
2007
Springer
241views Optimization» more  GECCO 2007»
15 years 7 months ago
Binary ant algorithm
When facing dynamic optimization problems the goal is no longer to find the extrema, but to track their progression through the space as closely as possible. Over these kind of ov...
Carlos Fernandes, Agostinho C. Rosa, Vitorino Ramo...