Sciweavers

1282 search results - page 218 / 257
» Practical Loss-Resilient Codes
Sort
View
105
Voted
DSS
2007
75views more  DSS 2007»
15 years 25 days ago
Short Term and Total Life Impact analysis of email worms in computer systems
This paper develops a methodology for analyzing and predicting the impact category of malicious code, particularly email worms. The current paper develops two frameworks to classi...
Insu Park, Raj Sharman, H. Raghav Rao, Shambhu J. ...
JMLR
2006
156views more  JMLR 2006»
15 years 25 days ago
Large Scale Multiple Kernel Learning
While classical kernel-based learning algorithms are based on a single kernel, in practice it is often desirable to use multiple kernels. Lanckriet et al. (2004) considered conic ...
Sören Sonnenburg, Gunnar Rätsch, Christi...
91
Voted
JSAC
2006
78views more  JSAC 2006»
15 years 25 days ago
On the optimality of multiantenna broadcast scheduling using zero-forcing beamforming
Abstract--Although the capacity of multiple-input/multipleoutput (MIMO) broadcast channels (BCs) can be achieved by dirty paper coding (DPC), it is difficult to implement in practi...
Taesang Yoo, Andrea J. Goldsmith
ENVSOFT
2007
126views more  ENVSOFT 2007»
15 years 25 days ago
Uncertainty and precaution in environmental management: Insights from the UPEM conference
Communication across the science-policy interface is complicated by uncertainty and ignorance associated with predictions on which to base policies. The international symposium â€...
Jeroen P. van der Sluijs
104
Voted
JSS
2006
88views more  JSS 2006»
15 years 25 days ago
A formal representation of functional size measurement methods
Estimating software size is a difficult task that requires a methodological approach. Many different methods that exist today use distinct abstractions to depict a software system...
Marjan Hericko, Ivan Rozman, Ales Zivkovic