Sciweavers

2652 search results - page 234 / 531
» Privacy-preserving linear programming
Sort
View
127
Voted
WWW
2009
ACM
15 years 10 months ago
Reliability analysis using weighted combinational models for web-based software
In the past, some researches suggested that engineers can use combined software reliability growth models (SRGMs) to obtain more accurate reliability prediction during testing. In...
Chao-Jung Hsu, Chin-Yu Huang
ICC
2008
IEEE
161views Communications» more  ICC 2008»
15 years 10 months ago
Joint Power Control and Link Scheduling in Wireless Networks for Throughput Optimization
—This paper concerns the problem of finding the minimum-length TDMA frame of a power-controlled wireless network subject to traffic demands and SINR (signalto-interference-plus...
Liqun Fu, Soung Chang Liew, Jianwei Huang
FAW
2007
Springer
177views Algorithms» more  FAW 2007»
15 years 10 months ago
The Parameterized Complexity of the Induced Matching Problem in Planar Graphs
Abstract. Given a graph G and a nonnegative integer k, the NP-complete Induced Matching problem asks for an edge subset M such that M is a matching and no two edges of M are joined...
Hannes Moser, Somnath Sikdar
129
Voted
ICA
2007
Springer
15 years 10 months ago
Sparse Component Analysis in Presence of Noise Using an Iterative EM-MAP Algorithm
Abstract. In this paper, a new algorithm for source recovery in underdetermined Sparse Component Analysis (SCA) or atomic decomposition on over-complete dictionaries is presented i...
Hadi Zayyani, Massoud Babaie-Zadeh, G. Hosein Mohi...
146
Voted
TLCA
2007
Springer
15 years 10 months ago
A Substructural Type System for Delimited Continuations
We propose type systems that abstractly interpret small-step rather than big-step operational semantics. We treat an expression or evaluation context as a structure in a linear log...
Oleg Kiselyov, Chung-chieh Shan