Sciweavers

3954 search results - page 479 / 791
» Image-based Model Completion
Sort
View
CISS
2008
IEEE
15 years 11 months ago
Distributed power control in wireless ad hoc networks using message passing: Throughput optimality and network utility maximizat
— This paper presents an algorithm for distributed power control and scheduling over wireless ad hoc-networks, where the data rate on each link depends on the transmission power ...
Aneesh Reddy, Sanjay Shakkottai, Lei Ying
ICASSP
2008
IEEE
15 years 11 months ago
Discriminative training by iterative linear programming optimization
In this paper, we cast discriminative training problems into standard linear programming (LP) optimization. Besides being convex and having globally optimal solution(s), LP progra...
Brian Mak, Benny Ng
160
Voted
ICEIS
2008
IEEE
15 years 11 months ago
Next-Generation Misuse and Anomaly Prevention System
Abstract. Network Intrusion Detection Systems (NIDS) aim at preventing network attacks and unauthorised remote use of computers. More accurately, depending on the kind of attack it...
Pablo Garcia Bringas, Yoseba K. Penya
IROS
2008
IEEE
156views Robotics» more  IROS 2008»
15 years 11 months ago
Bayesian state estimation and behavior selection for autonomous robotic exploration in dynamic environments
— In order to be truly autonomous, robots that operate in natural, populated environments must have the ability to create a model of these unpredictable dynamic environments and ...
Georgios Lidoris, Dirk Wollherr, Martin Buss
SADFE
2008
IEEE
15 years 11 months ago
Computer Forensics in Forensis
Different users apply computer forensic systems, models, and terminology in very different ways. They often make incompatible assumptions and reach different conclusions about ...
Sean Peisert, Matt Bishop, Keith Marzullo