Sciweavers

3171 search results - page 499 / 635
» Application of Reduce Order Modeling to Time Parallelization
Sort
View
ICASSP
2009
IEEE
15 years 10 months ago
Design of oversampled DFT modulated filter banks optimized for acoustic echo cancellation
This paper describes a method for designing oversampled DFT filter banks (FB) optimized for subband acoustic echo cancellation (AEC). For this application, the design requirements...
Qin Li, Wei-Ge Chen, Chao He, Henrique S. Malvar
HICSS
2006
IEEE
108views Biometrics» more  HICSS 2006»
15 years 9 months ago
Matching People and Jobs: A Bilateral Recommendation Approach
Recommendation systems are widely used on the Internet to assist customers in finding the products or services that best fit with their individual preferences. While current imple...
Jochen Malinowski, Tobias Keim, Oliver Wendt, Tim ...
CCS
2003
ACM
15 years 8 months ago
Learning attack strategies from intrusion alerts
Understanding the strategies of attacks is crucial for security applications such as computer and network forensics, intrusion response, and prevention of future attacks. This pap...
Peng Ning, Dingbang Xu
JSAC
2007
81views more  JSAC 2007»
15 years 3 months ago
Payload Length and Rate Adaptation for Multimedia Communications in Wireless LANs
— We provide a theoretical framework for cross-layer design in multimedia communications to optimize single-user throughput by selecting the transmitted bit rate and payload size...
Sayantan Choudhury, Jerry D. Gibson
111
Voted
CLUSTER
2005
IEEE
15 years 9 months ago
Minimizing the Network Overhead of Checkpointing in Cycle-harvesting Cluster Environments
Cycle-harvesting systems such as Condor have been developed to make desktop machines in a local area (which are often similar to clusters in hardware configuration) available as ...
Daniel Nurmi, John Brevik, Richard Wolski