Sciweavers

1653 search results - page 277 / 331
» Directed tree-width examples
Sort
View
ICTAI
2006
IEEE
15 years 7 months ago
On the Relationships between Clustering and Spatial Co-location Pattern Mining
The goal of spatial co-location pattern mining is to find subsets of spatial features frequently located together in spatial proximity. Example co-location patterns include servi...
Yan Huang, Pusheng Zhang
IROS
2006
IEEE
163views Robotics» more  IROS 2006»
15 years 7 months ago
Robotic On-Orbit Servicing - DLR's Experience and Perspective
The increasing number of launched satellites per year, calls for solutions to keep free operational space for telecommunication systems in geo-synchronized orbit, as well as to av...
Klaus Landzettel, Carsten Preusche, Alin Albu-Sch&...
ISCAS
2006
IEEE
121views Hardware» more  ISCAS 2006»
15 years 7 months ago
A frequency domain based TEQ design for DSL systems
that the equivalent channel is approximately an impulse. In [7], Martin et al. propose a globally convergent blind adap-In this paper, we propose a frequency domain based de- tive ...
Yuan-Pei Lin, Yu-Pin Lin, See-May Phoong
SRDS
2006
IEEE
15 years 7 months ago
Solving Consensus Using Structural Failure Models
Failure models characterise the expected component failures in fault-tolerant computing. In the context of distributed systems, a failure model usually consists of two parts: a fu...
Timo Warns, Felix C. Freiling, Wilhelm Hasselbring
125
Voted
ASPLOS
2006
ACM
15 years 7 months ago
Temporal search: detecting hidden malware timebombs with virtual machines
Worms, viruses, and other malware can be ticking bombs counting down to a specific time, when they might, for example, delete files or download new instructions from a public we...
Jedidiah R. Crandall, Gary Wassermann, Daniela A. ...