Sciweavers

2797 search results - page 354 / 560
» Code query by example
Sort
View
158
Voted
TWC
2011
254views more  TWC 2011»
14 years 11 months ago
Blind Channel Estimation for STBC Systems Using Higher-Order Statistics
—This paper describes a new blind channel estimation algorithm for Space-Time Block Coded (STBC) systems. The proposed method exploits the statistical independence of sources bef...
Vincent Choqueuse, Ali Mansour, Gilles Burel, Ludo...
IDA
2010
Springer
14 years 10 months ago
Fingerprint classification based on subclass analysis using multiple templates of support vector machines
Fingerprint classification reduces the searching time of an automated fingerprint identification system. Since fingerprints have properties of intra-class diversities and inter-cla...
Jun-Ki Min, Jin-Hyuk Hong, Sung-Bae Cho
219
Voted
ESSOS
2011
Springer
14 years 7 months ago
An Architecture-Centric Approach to Detecting Security Patterns in Software
Abstract. Today, software security is an issue with increasing importance. Developers, software designers, end users, and enterprises have their own needs w.r.t. software security....
Michaela Bunke, Karsten Sohr
118
Voted
ACSAC
2007
IEEE
15 years 10 months ago
Quarantining Untrusted Entities: Dynamic Sandboxing Using LEAP
Jails, Sandboxes and other isolation mechanisms limit the damage from untrusted programs by reducing a process’s privileges to the minimum. Sandboxing is designed to thwart such...
Manigandan Radhakrishnan, Jon A. Solworth
128
Voted
GFKL
2007
Springer
148views Data Mining» more  GFKL 2007»
15 years 10 months ago
Information Integration of Partially Labeled Data
Abstract. A central task when integrating data from different sources is to detect identical items. For example, price comparison websites have to identify offers for identical p...
Steffen Rendle, Lars Schmidt-Thieme