Sciweavers

4428 search results - page 738 / 886
» The Chow Parameters Problem
Sort
View
JCO
2006
67views more  JCO 2006»
15 years 4 months ago
Resource allocation for restoration of compromised systems
Computer systems are constantly under the threats of being attacked and in many cases these attacks succeed. Today's networked systems are thus built to be intrusion tolerant....
Qunwei Zheng, Sibabrata Ray, Xiaoyan Hong
JMIV
2006
124views more  JMIV 2006»
15 years 4 months ago
Iterative Total Variation Regularization with Non-Quadratic Fidelity
Abstract. A generalized iterative regularization procedure based on the total variation penalization is introduced for image denoising models with non-quadratic convex fidelity ter...
Lin He, Martin Burger, Stanley Osher
JSAC
2006
83views more  JSAC 2006»
15 years 4 months ago
Optimal ACK mechanisms of the IEEE 802.15.3 MAC for ultra-wideband systems
Ultra-wideband (UWB) transmission is an emerging wireless technology for future short-range indoor and outdoor multimedia applications. To coordinate the access to the wireless med...
Yang Xiao, Xuemin Shen, Hai Jiang
ML
2008
ACM
15 years 4 months ago
Margin-based first-order rule learning
Abstract We present a new margin-based approach to first-order rule learning. The approach addresses many of the prominent challenges in first-order rule learning, such as the comp...
Ulrich Rückert, Stefan Kramer
ML
2008
ACM
222views Machine Learning» more  ML 2008»
15 years 4 months ago
Boosted Bayesian network classifiers
The use of Bayesian networks for classification problems has received significant recent attention. Although computationally efficient, the standard maximum likelihood learning me...
Yushi Jing, Vladimir Pavlovic, James M. Rehg