Sciweavers

5948 search results - page 998 / 1190
» Computing Robust Counter-Strategies
Sort
View
126
Voted
CDC
2008
IEEE
143views Control Systems» more  CDC 2008»
15 years 10 months ago
On the use of numerical methods for analysis and control of nonlinear convective systems
Abstract— A common approach to designing feedback controllers for nonlinear partial differential equations (PDEs) is to linearize the system about an equilibrium and use the line...
Edward Allen, John A. Burns, David S. Gilliam
160
Voted
CISIM
2008
IEEE
15 years 10 months ago
Evolution Induced Secondary Immunity: An Artificial Immune System Based Intrusion Detection System
The analogy between Immune Systems and Intrusion Detection Systems encourage the use of Artificial Immune Systems for anomaly detection in computer networks. This paper describes ...
Divyata Dal, Siby Abraham, Ajith Abraham, Sugata S...
132
Voted
CISS
2008
IEEE
15 years 10 months ago
Distributed detection in the presence of frequency offset and phase shift
— In this paper, we study the problem of distributed detection in the presence of unknown carrier frequency offset (CFO) and initial phase, the issue we encounter in the emerging...
Tao Wu, Qi Cheng
134
Voted
CISS
2008
IEEE
15 years 10 months ago
1-Bit compressive sensing
Abstract—Compressive sensing is a new signal acquisition technology with the potential to reduce the number of measurements required to acquire signals that are sparse or compres...
Petros Boufounos, Richard G. Baraniuk
97
Voted
CODES
2008
IEEE
15 years 10 months ago
Dynamic tuning of configurable architectures: the AWW online algorithm
Architectures with software-writable parameters, or configurable architectures, enable runtime reconfiguration of computing platforms to the applications they execute. Such dynami...
Chen Huang, David Sheldon, Frank Vahid