Sciweavers

11328 search results - page 1954 / 2266
» Timed Branching Processes
Sort
View
JDCTA
2010
172views more  JDCTA 2010»
14 years 11 months ago
Characterizing MEGACO Security in the presence Diameter Server
This paper analyzes performance of MEGACO (Media Gateway Control Protocol) based on Diameter which is an Authentication, Authorization,andAccounting (AAA) protocol developed withi...
Pedram Hajipour, Kolsoom Abbasi Shahkooh
JMLR
2010
161views more  JMLR 2010»
14 years 11 months ago
Training and Testing Low-degree Polynomial Data Mappings via Linear SVM
Kernel techniques have long been used in SVM to handle linearly inseparable problems by transforming data to a high dimensional space, but training and testing large data sets is ...
Yin-Wen Chang, Cho-Jui Hsieh, Kai-Wei Chang, Micha...
NA
2010
124views more  NA 2010»
14 years 11 months ago
An efficient unified approach for the numerical solution of delay differential equations
In this paper we propose a new framework for designing a delay differential equation (DDE) solver which works with any supplied initial value problem (IVP) solver that is based on...
Hossein ZivariPiran, Wayne H. Enright
SAC
2010
ACM
14 years 11 months ago
Probabilistic relabelling strategies for the label switching problem in Bayesian mixture models
The label switching problem is caused by the likelihood of a Bayesian mixture model being invariant to permutations of the labels. The permutation can change multiple times betwee...
M. Sperrin, Thomas Jaki, E. Wit
SIAMREV
2010
140views more  SIAMREV 2010»
14 years 11 months ago
What Shape Is Your Conjugate? A Survey of Computational Convex Analysis and Its Applications
Computational Convex Analysis algorithms have been rediscovered several times in the past by researchers from different fields. To further communications between practitioners, we ...
Yves Lucet
« Prev « First page 1954 / 2266 Last » Next »