Sciweavers

235 search results - page 40 / 47
» A comparison of normal estimation schemes
Sort
View
NIPS
2003
14 years 11 months ago
A Classification-based Cocktail-party Processor
At a cocktail party, a listener can selectively attend to a single voice and filter out other acoustical interferences. How to simulate this perceptual ability remains a great cha...
Nicoleta Roman, DeLiang L. Wang, Guy J. Brown
KDD
2009
ACM
173views Data Mining» more  KDD 2009»
15 years 2 months ago
Malware detection using statistical analysis of byte-level file content
Commercial anti-virus software are unable to provide protection against newly launched (a.k.a “zero-day”) malware. In this paper, we propose a novel malware detection techniqu...
S. Momina Tabish, M. Zubair Shafiq, Muddassar Faro...
WS
2004
ACM
15 years 3 months ago
SeRLoc: secure range-independent localization for wireless sensor networks
In many applications of wireless sensor networks (WSN), sensors are deployed un-tethered in hostile environments. For locationaware WSN applications, it is essential to ensure tha...
Loukas Lazos, Radha Poovendran
JSAC
2007
117views more  JSAC 2007»
14 years 9 months ago
Optimization of Training and Scheduling in the Non-Coherent SIMO Multiple Access Channel
— Channel state information (CSI) is important for achieving large rates in MIMO channels. However, in timevarying MIMO channels, there is a tradeoff between the time/energy spen...
Sugumar Murugesan, Elif Uysal-Biyikoglu, Philip Sc...
TMC
2002
106views more  TMC 2002»
14 years 9 months ago
Optimal Resource Management in Wireless Multimedia Wideband CDMA Systems
This paper proposes a scheme of optimal resource management for reverse-link transmissions in multimedia wideband code-division multiple-access (WCDMA) communications. It is to gua...
Majid Soleimanipour, Weihua Zhuang, George H. Free...