Sciweavers

5564 search results - page 865 / 1113
» Performance Modeling of HPC Applications
Sort
View
JCS
2010
80views more  JCS 2010»
14 years 12 months ago
Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols
We introduce constraint differentiation, a powerful technique for reducing search when model-checking security protocols using constraint-based methods. Constraint differentiation...
Sebastian Mödersheim, Luca Viganò, Dav...
TWC
2010
14 years 11 months ago
On the Efficacy of Frequency Hopping in Coping with Jamming Attacks in 802.11 Networks
Abstract--Frequency hopping (FH) has been the most popularly considered approach for alleviating the effects of jamming attacks. We re-examine, the efficacy of FH based on both exp...
Konstantinos Pelechrinis, Christos Koufogiannakis,...
ICASSP
2011
IEEE
14 years 8 months ago
Estimation of ordinal approach-avoidance labels in dyadic interactions: Ordinal logistic regression approach
Behavioral Signal Processing aims at automating behavioral coding schemes such as those prevalent in psychology and mental health research. This paper describes methods to quantif...
Viktor Rozgic, Bo Xiao, Athanasios Katsamanis, Bri...
161
Voted
ICASSP
2011
IEEE
14 years 8 months ago
Sensing-aware classification with high-dimensional data
In many applications decisions must be made about the state of an object based on indirect noisy observation of highdimensional data. An example is the determination of the presen...
Burkay Orten, Prakash Ishwar, W. Clem Karl, Venkat...
ICDE
2011
IEEE
200views Database» more  ICDE 2011»
14 years 8 months ago
Deriving probabilistic databases with inference ensembles
— Many real-world applications deal with uncertain or missing data, prompting a surge of activity in the area of probabilistic databases. A shortcoming of prior work is the assum...
Julia Stoyanovich, Susan B. Davidson, Tova Milo, V...