Sciweavers

15073 search results - page 2800 / 3015
» Probabilistic algorithms for computing resultants
Sort
View
PE
2010
Springer
144views Optimization» more  PE 2010»
14 years 8 months ago
A unified framework for the bottleneck analysis of multiclass queueing networks
We introduce a new framework supporting the bottleneck analysis of closed, multiclass BCMP queueing networks in the limiting regime where the number of jobs proportionally grows t...
Jonatha Anselmi, Paolo Cremonesi
SIAMMAX
2010
145views more  SIAMMAX 2010»
14 years 8 months ago
Adaptive First-Order Methods for General Sparse Inverse Covariance Selection
In this paper, we consider estimating sparse inverse covariance of a Gaussian graphical model whose conditional independence is assumed to be partially known. Similarly as in [5],...
Zhaosong Lu
TSE
2010
230views more  TSE 2010»
14 years 8 months ago
Vulnerability Discovery with Attack Injection
The increasing reliance put on networked computer systems demands higher levels of dependability. This is even more relevant as new threats and forms of attack are constantly being...
João Antunes, Nuno Ferreira Neves, Miguel C...
TVLSI
2010
14 years 8 months ago
Discrete Buffer and Wire Sizing for Link-Based Non-Tree Clock Networks
Clock network is a vulnerable victim of variations as well as a main power consumer in many integrated circuits. Recently, link-based non-tree clock network attracts people's...
Rupak Samanta, Jiang Hu, Peng Li
JAISE
2011
238views more  JAISE 2011»
14 years 8 months ago
A bio-inspired system model for interactive surveillance applications
Advances in computer vision and pattern recognition research are leading to video surveillance systems with improved scene analysis capabilities. However, up to now few works have ...
Alessio Dore, Matteo Pinasco, Lorenzo Ciardelli, C...
« Prev « First page 2800 / 3015 Last » Next »