Sciweavers

1220 search results - page 235 / 244
» Probabilistic models for pattern statistics
Sort
View
PIMRC
2010
IEEE
14 years 9 months ago
Multi-dimensional K-factor analysis for V2V radio channels in open sub-urban street crossings
In this paper we analyze the Ricean K-factor for vehicle-to-vehicle (V2V) communications in a typical open suburban street crossing. The channel conditions vary from non line-of si...
Laura Bernadó, Thomas Zemen, Johan Karedal,...
ICTAC
2009
Springer
14 years 9 months ago
A First-Order Policy Language for History-Based Transaction Monitoring
Online trading invariably involves dealings between strangers, so it is important for one party to be able to judge objectively the trustworthiness of the other. In such a setting,...
Andreas Bauer 0002, Rajeev Goré, Alwen Tiu
WISEC
2010
ACM
15 years 6 months ago
pBMDS: a behavior-based malware detection system for cellphone devices
Computing environments on cellphones, especially smartphones, are becoming more open and general-purpose, thus they also become attractive targets of malware. Cellphone malware no...
Liang Xie, Xinwen Zhang, Jean-Pierre Seifert, Senc...
MICRO
2006
IEEE
145views Hardware» more  MICRO 2006»
15 years 5 months ago
Virtually Pipelined Network Memory
We introduce virtually-pipelined memory, an architectural technique that efficiently supports high-bandwidth, uniform latency memory accesses, and high-confidence throughput eve...
Banit Agrawal, Timothy Sherwood
GECCO
2005
Springer
186views Optimization» more  GECCO 2005»
15 years 5 months ago
Subproblem optimization by gene correlation with singular value decomposition
Several ways of using singular value decomposition (SVD), a linear algebra technique typically used for information retrieval, to decompose problems into subproblems are investiga...
Jacob G. Martin