Sciweavers

2652 search results - page 402 / 531
» Privacy-preserving linear programming
Sort
View
ICASSP
2008
IEEE
15 years 4 months ago
Wavelet-domain compressive signal reconstruction using a Hidden Markov Tree model
Compressive sensing aims to recover a sparse or compressible signal from a small set of projections onto random vectors; conventional solutions involve linear programming or greed...
Marco F. Duarte, Michael B. Wakin, Richard G. Bara...
ICC
2008
IEEE
118views Communications» more  ICC 2008»
15 years 4 months ago
Placement of Multiple Mobile Data Collectors in Underwater Acoustic Sensor Networks
—For the sake of maximizing the network lifetime, we propose a novel placement scheme for mobile data collectors in Underwater Acoustic Sensor Networks (UASNs). Our scheme is bas...
Waleed Alsalih, Selim G. Akl, Hossam S. Hassanein
ICSM
2008
IEEE
15 years 4 months ago
Quota-constrained test-case prioritization for regression testing of service-centric systems
Test-case prioritization is a typical scenario of regression testing, which plays an important role in software maintenance. With the popularity of Web Services, integrating Web S...
Shan-Shan Hou, Lu Zhang, Tao Xie, Jiasu Sun
ICTAI
2008
IEEE
15 years 4 months ago
Haplotype Inference with Boolean Constraint Solving: An Overview
Boolean satisfiability (SAT) finds a wide range of practical applications, including Artificial Intelligence and, more recently, Bioinformatics. Although encoding some combinat...
Inês Lynce, Ana Graça, João Ma...
IEEEIAS
2008
IEEE
15 years 4 months ago
Ensemble of One-Class Classifiers for Network Intrusion Detection System
To achieve high accuracy while lowering false alarm rates are major challenges in designing an intrusion detection system. In addressing this issue, this paper proposes an ensembl...
Anazida Zainal, Mohd Aizaini Maarof, Siti Mariyam ...