Sciweavers

1865 search results - page 299 / 373
» Pan-Private Streaming Algorithms
Sort
View
156
Voted
ICML
2008
IEEE
16 years 4 months ago
Modeling interleaved hidden processes
Hidden Markov models assume that observations in time series data stem from some hidden process that can be compactly represented as a Markov chain. We generalize this model by as...
Niels Landwehr
153
Voted
SIGMOD
2001
ACM
165views Database» more  SIGMOD 2001»
16 years 3 months ago
Mining System Audit Data: Opportunities and Challenges
Intrusion detection is an essential component of computer security mechanisms. It requires accurate and efficient analysis of a large amount of system and network audit data. It c...
Wenke Lee, Wei Fan
149
Voted
DCC
2003
IEEE
16 years 3 months ago
Unequal Loss Protection for H.263 Compressed Video
We study the application of Unequal Loss Protection (ULP) algorithms to motion-compensated video over lossy packet networks. In particular, we focus on streaming video applications...
Justin Goshi, Richard E. Ladner, Eve A. Riskin, Al...
GLOBECOM
2009
IEEE
15 years 10 months ago
Joint Power and Channel Resource Allocation for F/TDMA Decode and Forward Relay Networks
—In this paper, we study the joint power and channel resource allocation problem for a multiuser F/TDMA decodeand-forward (DF) relay network under per-node power constraints and ...
Yin Sun, Yuanzhang Xiao, Ming Zhao 0001, Xiaofeng ...
IWCMC
2009
ACM
15 years 10 months ago
A cognitive radio system for home theatre "5+1 audio" surround applications
This paper presents the application of cognitive algorithm for a stream diffusion in home theatre “5+1 audio” surround applications. We develop a wavelet-based method to effic...
Valeria Orani, Vlad Popescu, Maurizio Murroni