Sciweavers

1778 search results - page 288 / 356
» Building a Knowledge Base: An Example
Sort
View
DCC
2004
IEEE
16 years 5 days ago
Source Coding With Distortion Side Information At The Encoder
Abstract: We consider lossy source coding when side information affecting the distortion measure may be available at the encoder, decoder, both, or neither. For example, such disto...
Emin Martinian, Gregory W. Wornell, Ram Zamir
PVM
2009
Springer
15 years 7 months ago
Hierarchical Collectives in MPICH2
Abstract. Most parallel systems on which MPI is used are now hierarchical: some processors are much closer to others in terms of interconnect performance. One of the most common su...
Hao Zhu, David Goodell, William Gropp, Rajeev Thak...
ACSAC
2008
IEEE
15 years 7 months ago
Improving Security Visualization with Exposure Map Filtering
Flow based analysis of network traffic is commonly used to analyze and understand security-related events. Graphical analysis helps analysts detect patterns or behaviors that woul...
Mansour Alsaleh, David Barrera, Paul C. van Oorsch...
96
Voted
CDC
2008
IEEE
131views Control Systems» more  CDC 2008»
15 years 7 months ago
Explicit model predictive control for linear parameter-varying systems
Abstract— In this paper we demonstrate how one can reformulate the MPC problem for LPV systems to a series of mpLPs by a closed-loop minimax MPC algorithm based on dynamic progra...
Thomas Besselmann, Johan Löfberg, Manfred Mor...
DASFAA
2007
IEEE
159views Database» more  DASFAA 2007»
15 years 7 months ago
Mining Vague Association Rules
In many online shopping applications, traditional Association Rule (AR) mining has limitations as it only deals with the items that are sold but ignores the items that are almost s...
An Lu, Yiping Ke, James Cheng, Wilfred Ng