Sciweavers

4446 search results - page 802 / 890
» Learning Observer Agents
Sort
View
ESSOS
2009
Springer
15 years 4 months ago
Protection Poker: Structuring Software Security Risk Assessment and Knowledge Transfer
Discovery of security vulnerabilities is on the rise. As a result, software development teams must place a higher priority on preventing the injection of vulnerabilities in softwar...
Laurie Williams, Michael Gegick, Andrew Meneely
GLOBECOM
2009
IEEE
15 years 4 months ago
Analysis of Degrees of Freedom of Interfering MISO Broadcast Channels
— In this paper, we provide a lower and upper bound for the number of degrees of freedom (DOF) of B multipleinput single-output (MISO) broadcast channels (BC) where each base sta...
Seokhwan Park, Inkyu Lee
ICASSP
2009
IEEE
15 years 4 months ago
Independent component analysis for noisy speech recognition
Independent component analysis (ICA) is not only popular for blind source separation but also for unsupervised learning when the observations can be decomposed into some independe...
Hsin-Lung Hsieh, Jen-Tzung Chien, Koichi Shinoda, ...
ICC
2009
IEEE
107views Communications» more  ICC 2009»
15 years 4 months ago
Dynamic Resource Modeling for Heterogeneous Wireless Networks
— High variability of access resources in heterogenous wireless networks and limited computing power and battery life of mobile computing devices such as smartphones call for nov...
Dimitrios Tsamis, Tansu Alpcan, Jatinder Pal Singh...
ICANNGA
2009
Springer
145views Algorithms» more  ICANNGA 2009»
15 years 4 months ago
Supporting Scalable Bayesian Networks Using Configurable Discretizer Actuators
We propose a generalized model with configurable discretizer actuators as a solution to the problem of the discretization of massive numerical datasets. Our solution is based on a ...
Isaac Olusegun Osunmakinde, Antoine B. Bagula