Sciweavers

17288 search results - page 3228 / 3458
» Hybrid Optimizations: Which Optimization Algorithm to Use
Sort
View
ICAC
2009
IEEE
15 years 11 months ago
Threat-model-driven runtime adaptation and evaluation of intrusion detection system
We present a mechanism for autonomous self-adaptation of a network-based intrusion detection system (IDS). The system is composed of a set of cooperating agents, each of which is ...
Martin Rehák, Eugen Staab, Volker Fusenig, ...
ICASSP
2009
IEEE
15 years 11 months ago
Maximum-likelihood estimation of autoregressive models with conditional independence constraints
We propose a convex optimization method for maximum likelihood estimation of autoregressive models, subject to conditional independence constraints. This problem is an extension t...
Jitkomut Songsiri, Joachim Dahl, Lieven Vandenberg...
152
Voted
ICASSP
2009
IEEE
15 years 11 months ago
Sparse decomposition of mixed audio signals by basis pursuit with autoregressive models
We develop a framework to detect when certain sounds are present in a mixed audio signal. We focus on the regime where out of a large number of possible sounds, a small but unknow...
Youngmin Cho, Lawrence K. Saul
147
Voted
ICC
2009
IEEE
144views Communications» more  ICC 2009»
15 years 11 months ago
Power Allocation for Multi-Access Two-Way Relaying
—We consider a multi-access two-way relay network where multiple pairs of users exchange information with their pre-assigned partners with the assistance of an intermediate relay...
Min Chen, Aylin Yener
134
Voted
ICSM
2009
IEEE
15 years 11 months ago
Incremental call graph reanalysis for AspectJ software
Program call graph representation can be used to support many tasks in compiler optimization, program comprehension, and software maintenance. During software evolution, the call ...
Yu Lin, Sai Zhang, Jianjun Zhao
« Prev « First page 3228 / 3458 Last » Next »