Sciweavers

2826 search results - page 476 / 566
» A resource-based analysis of IT sourcing
Sort
View
CSDA
2008
115views more  CSDA 2008»
15 years 1 months ago
Complex-valued ICA based on a pair of generalized covariance matrices
It is shown that any pair of scatter and spatial scatter matrices yields an estimator of the separating matrix for complex-valued independent component analysis (ICA). Scatter (re...
Esa Ollila, Hannu Oja, Visa Koivunen
CN
2006
117views more  CN 2006»
15 years 1 months ago
Error resilient image transport in wireless sensor networks
In this paper, we propose an "in-network" diversity combining scheme for image transport over wireless sensor networks. We consider a wireless sensor network with both w...
Huaming Wu, Alhussein A. Abouzeid
CORR
2006
Springer
116views Education» more  CORR 2006»
15 years 1 months ago
Energy Efficiency and Delay Quality-of-Service in Wireless Networks
The energy-delay tradeoffs in wireless networks are studied using a game-theoretic framework. A multi-class multipleaccess network is considered in which users choose their transmi...
Farhad Meshkati, H. Vincent Poor, Stuart C. Schwar...
CORR
2006
Springer
138views Education» more  CORR 2006»
15 years 1 months ago
Applying and Combining Three Different Aspect Mining Techniques
Abstract. Understanding a software system at source-code level requires understanding the different concerns that it addresses, which in turn requires a way to identify these conce...
Mariano Ceccato, Marius Marin, Kim Mens, Leon Moon...
ENTCS
2006
175views more  ENTCS 2006»
15 years 1 months ago
Observing Internet Worm and Virus Attacks with a Small Network Telescope
A network telescope is a portion of the IP address space which is devoted to observing inbound internet traffic. The purpose of a network telescope is to detect and log malicious ...
Uli Harder, Matt W. Johnson, Jeremy T. Bradley, Wi...