Sciweavers

5864 search results - page 100 / 1173
» Can We Work around Numerical Methods
Sort
View
TIFS
2008
142views more  TIFS 2008»
15 years 4 months ago
An FPGA-Based Network Intrusion Detection Architecture
Abstract--Network intrusion detection systems (NIDSs) monitor network traffic for suspicious activity and alert the system or network administrator. With the onset of gigabit netwo...
Abhishek Das, David Nguyen, Joseph Zambreno, Gokha...
ECCV
1994
Springer
16 years 6 months ago
On the Enumerative Geometry of Aspect Graphs
Most of the work achieved thus far on aspect graphs has concentrated on the design of algorithms for computing the representation. After reviewing how the space of viewpoints can b...
Sylvain Petitjean
SIAMMAX
2010
224views more  SIAMMAX 2010»
14 years 10 months ago
Robust Approximate Cholesky Factorization of Rank-Structured Symmetric Positive Definite Matrices
Abstract. Given a symmetric positive definite matrix A, we compute a structured approximate Cholesky factorization A RT R up to any desired accuracy, where R is an upper triangula...
Jianlin Xia, Ming Gu
BERTINORO
2005
Springer
15 years 9 months ago
Spatial Computing: The TOTA Approach
Spatial abstractions promise to be basic necessary ingredients for a novel “spatial computing” approach to distributed systems development and management, suitable to tackle th...
Marco Mamei, Franco Zambonelli
125
Voted
TSP
2008
124views more  TSP 2008»
15 years 4 months ago
Robust Beamforming via Worst-Case SINR Maximization
Minimum variance beamforming, which uses a weight vector that maximizes the signal-to-interference-plus-noise ratio (SINR), is often sensitive to estimation error and uncertainty i...
Seung-Jean Kim, Alessandro Magnani, Almir Mutapcic...