Sciweavers

4815 search results - page 754 / 963
» A Pattern Approach to Modeling the Provider Selection Proble...
Sort
View
DEXAW
1999
IEEE
75views Database» more  DEXAW 1999»
15 years 8 months ago
Coordination of Security Levels for Internet Architectures
Internet systems provide a variety of ways to exchange information, contain large amounts and variety of data, and have become quite complex, making them vulnerable to attacks fro...
Eduardo B. Fernández
CAD
2005
Springer
15 years 4 months ago
Shape-based searching for product lifecycle applications
Estimates suggest that more than 75% of engineering design activity comprises reuse of previous design knowledge to address a new design problem. Reusing design knowledge has grea...
Natraj Iyer, Subramaniam Jayanti, Kuiyang Lou, Yag...
ICUMT
2009
15 years 2 months ago
Coverage and adaptive scheduling algorithms for criticality management on video wireless sensor networks
In WSN-based surveillance systems power conservation is an important issue but one must also ensure that the application's objectives are met. In this paper, we jointly addres...
Abdallah Makhoul, Rachid Saadi, CongDuc Pham
ICASSP
2011
IEEE
14 years 8 months ago
Multichannel nonnegative tensor factorization with structured constraints for user-guided audio source separation
Separating multiple tracks from professionally produced music recordings (PPMRs) is still a challenging problem. We address this task with a user-guided approach in which the sepa...
Alexey Ozerov, Cédric Févotte, Rapha...
CEC
2007
IEEE
15 years 11 months ago
Bayesian inference in estimation of distribution algorithms
— Metaheuristics such as Estimation of Distribution Algorithms and the Cross-Entropy method use probabilistic modelling and inference to generate candidate solutions in optimizat...
Marcus Gallagher, Ian Wood, Jonathan M. Keith, Geo...