Sciweavers

936 search results - page 81 / 188
» Predicting the Future
Sort
View
INFORMATICASI
2010
15 years 2 months ago
Planning to Discover and Counteract Attacks
Recognizing attack plans is one of the goals of security analysts. Attack plan recognition is critical for predicting future actions of attackers, generating possible actions (i.e...
Tatiana Kichkaylo, Tatyana Ryutov, Michael D. Oros...
INFOCOM
1999
IEEE
15 years 9 months ago
A Kalman-Filter Method for Power Control in Broadband Wireless Networks
: A Kalman-filter method for power control is proposed for broadband, packet-switched TDMA wireless networks. By observing the temporal correlation of cochannel interference when t...
Kin K. Leung
DFT
2007
IEEE
112views VLSI» more  DFT 2007»
15 years 11 months ago
Estimation of Electromigration-Aggravating Narrow Interconnects Using a Layout Sensitivity Model
During semiconductor manufacturing, particles undesirably depose on the surface of the wafer causing “open” and “short” defects to interconnects. In this paper, a third ty...
Rani S. Ghaida, Payman Zarkesh-Ha
KDD
2010
ACM
263views Data Mining» more  KDD 2010»
15 years 9 months ago
Social action tracking via noise tolerant time-varying factor graphs
Users’ behaviors (actions) in a social network are influenced by various factors such as personal interests, social influence, and global trends. However, few publications sys...
Chenhao Tan, Jie Tang, Jimeng Sun, Quan Lin, Fengj...
CGO
2008
IEEE
15 years 12 months ago
Spice: speculative parallel iteration chunk execution
The recent trend in the processor industry of packing multiple processor cores in a chip has increased the importance of automatic techniques for extracting thread level paralleli...
Easwaran Raman, Neil Vachharajani, Ram Rangan, Dav...