Sciweavers

8825 search results - page 148 / 1765
» All for one or one for all
Sort
View
COMPGEOM
2009
ACM
15 years 8 months ago
Randomly removing g handles at once
It was shown in [11] that any orientable graph of genus g can be probabilistically embedded into a graph of genus g − 1 with constant distortion. Removing handles one by one giv...
Glencora Borradaile, James R. Lee, Anastasios Sidi...
CDC
2008
IEEE
15 years 7 months ago
On the inverse scattering of star-shape LC-networks
— The study of the scattering data for a star-shape network of LC-transmission lines is transformed into the scattering analysis of a Schr¨odinger operator on the same graph. Th...
Filippo Visco-Comandini, Mazyar Mirrahimi, Michel ...
DEXAW
2008
IEEE
121views Database» more  DEXAW 2008»
15 years 7 months ago
Experiences on Designing an Integral Intrusion Detection System
Network Intrusion Detection Systems (NIDS) have the challenge to prevent network attacks and unauthorised remote use of computers. In order to achieve this goal, NIDS usually foll...
Yoseba K. Penya, Pablo Garcia Bringas
ICASSP
2008
IEEE
15 years 7 months ago
Blind source separation in a distributed microphone meeting environment for improved teleconferencing
From an audio perspective, the present state of teleconferencing technology leaves something to be desired; speaker overlap is one of the causes of this inadequate performance. To...
Jacek P. Dmochowski, Zicheng Liu, Philip A. Chou
ICDM
2008
IEEE
121views Data Mining» more  ICDM 2008»
15 years 7 months ago
Unifying Unknown Nodes in the Internet Graph Using Semisupervised Spectral Clustering
Most research on Internet topology is based on active measurement methods. A major difficulty in using these tools is that one comes across many unresponsive routers. Different m...
Anat Almog, Jacob Goldberger, Yuval Shavitt