Sciweavers

3096 search results - page 460 / 620
» The Generalized FITC Approximation
Sort
View
ICMI
2009
Springer
123views Biometrics» more  ICMI 2009»
15 years 11 months ago
Learning and predicting multimodal daily life patterns from cell phones
In this paper, we investigate the multimodal nature of cell phone data in terms of discovering recurrent and rich patterns in people’s lives. We present a method that can discov...
Katayoun Farrahi, Daniel Gatica-Perez
ISSAC
2009
Springer
144views Mathematics» more  ISSAC 2009»
15 years 11 months ago
H-LLL: using householder inside LLL
We describe a new LLL-type algorithm, H-LLL, that relies on Householder transformations to approximate the underlying Gram-Schmidt orthogonalizations. The latter computations are ...
Ivan Morel, Damien Stehlé, Gilles Villard
MFCS
2009
Springer
15 years 11 months ago
The Cost of Stability in Network Flow Games
The core of a cooperative game contains all stable distributions of a coalition’s gains among its members. However, some games have an empty core, with every distribution being ...
Ezra Resnick, Yoram Bachrach, Reshef Meir, Jeffrey...
ASPDAC
2009
ACM
143views Hardware» more  ASPDAC 2009»
15 years 11 months ago
Statistical modeling and analysis of chip-level leakage power by spectral stochastic method
In this paper, we present a novel statistical full-chip leakage power analysis method. The new method can provide a general framework to derive the full-chip leakage current or po...
Ruijing Shen, Ning Mi, Sheldon X.-D. Tan, Yici Cai...
IMC
2009
ACM
15 years 11 months ago
Geolocalization of proxied services and its application to fast-flux hidden servers
Fast-flux is a redirection technique used by cyber-criminals to hide the actual location of malicious servers. Its purpose is to evade identification and prevent or, at least de...
Claude Castelluccia, Mohamed Ali Kâafar, Per...