Sciweavers

2652 search results - page 400 / 531
» Privacy-preserving linear programming
Sort
View
RECOMB
2010
Springer
15 years 4 months ago
On the Genealogy of Asexual Diploids
Given molecular genetic data from diploid individuals that, at present, reproduce mostly or exclusively asexually without recombination, an important problem in evolutionary biolog...
Fumei Lam, Charles H. Langley, Yun S. Song
ASIAMS
2008
IEEE
15 years 4 months ago
Data Reduction and Ensemble Classifiers in Intrusion Detection
Efficiency is one of the major issues in intrusion detection. Inefficiency is often attributed to high overhead and this is caused by several reasons. Among them are continuous de...
Anazida Zainal, Mohd Aizaini Maarof, Siti Mariyam ...
CDC
2008
IEEE
145views Control Systems» more  CDC 2008»
15 years 4 months ago
Parameter estimation with expected and residual-at-risk criteria
In this paper we study a class of uncertain linear estimation problems in which the data are affected by random uncertainty. In this setting, we consider two estimation criteria,...
Giuseppe Carlo Calafiore, Ufuk Topcu, Laurent El G...
DATE
2008
IEEE
136views Hardware» more  DATE 2008»
15 years 4 months ago
A Framework of Stochastic Power Management Using Hidden Markov Model
- The effectiveness of stochastic power management relies on the accurate system and workload model and effective policy optimization. Workload modeling is a machine learning proce...
Ying Tan, Qinru Qiu
DATE
2008
IEEE
122views Hardware» more  DATE 2008»
15 years 4 months ago
Finding the Worst Voltage Violation in Multi-Domain Clock Gated Power Network
This paper proposes an efficient method to find the worst case of voltage violation by multi-domain clock gating in an on-chip power network. We first present a voltage response i...
Wanping Zhang, Yi Zhu, Wenjian Yu, Ling Zhang, Rui...