Sciweavers

5165 search results - page 793 / 1033
» Consistency of the Neighbor-Net Algorithm
Sort
View
DSRT
2008
IEEE
15 years 11 months ago
Modeling System Security Rules with Time Constraints Using Timed Extended Finite State Machines
Security and reliability are of paramount importance in designing and building real-time systems because any security failure can put the public and the environment at risk. In th...
Wissam Mallouli, Amel Mammar, Ana R. Cavalli
FOCS
2008
IEEE
15 years 11 months ago
Noise Tolerance of Expanders and Sublinear Expander Reconstruction
We consider the problem of online sublinear expander reconstruction and its relation to random walks in “noisy” expanders. Given access to an adjacency list representation of ...
Satyen Kale, Yuval Peres, C. Seshadhri
GLOBECOM
2008
IEEE
15 years 11 months ago
A Graph-Based Approach to Multi-Cell OFDMA Downlink Resource Allocation
— A novel, practical and low-complexity multi-cell OFDMA downlink channel assignment method using a graphbased approach is proposed in this work. The inter-cell interference (ICI...
Yu-Jung Chang, Zhifeng Tao, Jinyun Zhang, C. C. Ja...
122
Voted
ICARCV
2008
IEEE
166views Robotics» more  ICARCV 2008»
15 years 11 months ago
Composite feature modeling and retrieval
—Feature-based intelligent design and manufacturing systems in the Internet environment are an evolution of traditional geometric and solid modeling systems. This paper presents ...
Jin Hou, Dengsheng Zhang, Zeng Chen, Xuerong Xu, T...
ICASSP
2008
IEEE
15 years 11 months ago
Discriminative feature selection for hidden Markov models using Segmental Boosting
We address the feature selection problem for hidden Markov models (HMMs) in sequence classification. Temporal correlation in sequences often causes difficulty in applying featur...
Pei Yin, Irfan A. Essa, Thad Starner, James M. Reh...