Sciweavers

9732 search results - page 1837 / 1947
» Modelling Adaptivity with Aspects
Sort
View
IEEECIT
2010
IEEE
15 years 2 months ago
Enabling Privacy-preserving Credential-based Access Control with XACML and SAML
—In this paper we describe extensions to the access control industry standards XACML and SAML to enable privacy-preserving and credential-based access control. Rather than assumi...
Claudio Agostino Ardagna, Sabrina De Capitani di V...
INFOCOM
2010
IEEE
15 years 2 months ago
Delay Analysis for Cognitive Radio Networks with Random Access: A Fluid Queue View
Abstract—We consider a cognitive radio network where multiple secondary users (SUs) contend for spectrum usage, using random access, over available primary user (PU) channels. Ou...
Shanshan Wang, Junshan Zhang, Lang Tong
JMLR
2010
195views more  JMLR 2010»
15 years 2 months ago
Online Learning for Matrix Factorization and Sparse Coding
Sparse coding—that is, modelling data vectors as sparse linear combinations of basis elements—is widely used in machine learning, neuroscience, signal processing, and statisti...
Julien Mairal, Francis Bach, Jean Ponce, Guillermo...
JSAC
2010
143views more  JSAC 2010»
15 years 2 months ago
Balancing competing resource allocation demands in a public cellular network that supports emergency services
Abstract—When an emergency happens, public communication networks, including cellular networks, public switched telecommunication networks, and the Internet can be utilized to su...
Jiazhen Zhou, C. Beard
144
Voted
PROCEDIA
2010
115views more  PROCEDIA 2010»
15 years 2 months ago
Generative topographic mapping by deterministic annealing
Generative Topographic Mapping (GTM) is an important technique for dimension reduction which has been successfully applied to many fields. However the usual Expectation-Maximizat...
Jong Youl Choi, Judy Qiu, Marlon E. Pierce, Geoffr...
« Prev « First page 1837 / 1947 Last » Next »