Sciweavers

3383 search results - page 664 / 677
» Distributing the power of OLAP
Sort
View
CN
2007
146views more  CN 2007»
15 years 10 days ago
Autonomic control and personalization of a wireless access network
As ICT services are becoming more ubiquitous and mobile and access technologies grow to be more heterogeneous and complex, we are witnessing the increasing importance of two relat...
Nicola Blefari-Melazzi, Dario Di Sorte, Mauro Femm...
105
Voted
IJCV
2006
165views more  IJCV 2006»
15 years 10 days ago
A Riemannian Framework for Tensor Computing
Tensors are nowadays a common source of geometric information. In this paper, we propose to endow the tensor space with an affine-invariant Riemannian metric. We demonstrate that ...
Xavier Pennec, Pierre Fillard, Nicholas Ayache
ISF
2008
114views more  ISF 2008»
15 years 10 days ago
An OVAL-based active vulnerability assessment system for enterprise computer networks
Abstract Many security problems are caused by vulnerabilities hidden in enterprise computer networks. It is very important for system administrators to have knowledge about the sec...
Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan
CORR
2007
Springer
124views Education» more  CORR 2007»
15 years 10 days ago
Diversity-Multiplexing Tradeoff via Asymptotic Analysis of Large MIMO Systems
— Diversity–multiplexing tradeoff (DMT) presents a compact framework to compare various MIMO systems and channels in terms of the two main advantages they provide (i.e. high da...
Sergey Loyka, George Levin
JMLR
2008
129views more  JMLR 2008»
15 years 9 days ago
Finite-Time Bounds for Fitted Value Iteration
In this paper we develop a theoretical analysis of the performance of sampling-based fitted value iteration (FVI) to solve infinite state-space, discounted-reward Markovian decisi...
Rémi Munos, Csaba Szepesvári