Sciweavers

1220 search results - page 235 / 244
» Probabilistic models for pattern statistics
Sort
View
140
Voted
PIMRC
2010
IEEE
15 years 2 months ago
Multi-dimensional K-factor analysis for V2V radio channels in open sub-urban street crossings
In this paper we analyze the Ricean K-factor for vehicle-to-vehicle (V2V) communications in a typical open suburban street crossing. The channel conditions vary from non line-of si...
Laura Bernadó, Thomas Zemen, Johan Karedal,...
ICTAC
2009
Springer
15 years 2 months ago
A First-Order Policy Language for History-Based Transaction Monitoring
Online trading invariably involves dealings between strangers, so it is important for one party to be able to judge objectively the trustworthiness of the other. In such a setting,...
Andreas Bauer 0002, Rajeev Goré, Alwen Tiu
WISEC
2010
ACM
15 years 12 months ago
pBMDS: a behavior-based malware detection system for cellphone devices
Computing environments on cellphones, especially smartphones, are becoming more open and general-purpose, thus they also become attractive targets of malware. Cellphone malware no...
Liang Xie, Xinwen Zhang, Jean-Pierre Seifert, Senc...
MICRO
2006
IEEE
145views Hardware» more  MICRO 2006»
15 years 11 months ago
Virtually Pipelined Network Memory
We introduce virtually-pipelined memory, an architectural technique that efficiently supports high-bandwidth, uniform latency memory accesses, and high-confidence throughput eve...
Banit Agrawal, Timothy Sherwood
GECCO
2005
Springer
186views Optimization» more  GECCO 2005»
15 years 10 months ago
Subproblem optimization by gene correlation with singular value decomposition
Several ways of using singular value decomposition (SVD), a linear algebra technique typically used for information retrieval, to decompose problems into subproblems are investiga...
Jacob G. Martin