Sciweavers

24741 search results - page 4770 / 4949
» Virtual Network Computing
Sort
View
97
Voted
ICASSP
2011
IEEE
14 years 4 months ago
Proportionate affine projection sign algorithms for sparse system identification in impulsive interference
Two proportionate af ne projection sign algorithms (APSAs) are proposed for system identi cation applications, such as network echo cancellation (NEC), where the impulse response ...
Zengli Yang, Yahong Rosa Zheng, Steven L. Grant
CEC
2010
IEEE
14 years 4 months ago
Co-evolutionary search path planning under constrained information-sharing for a cooperative unmanned aerial vehicle team
—Mobile cooperative sensor networks are increasingly used for surveillance and reconnaissance tasks to support domain picture compilation. However, efficient distributed informat...
Jean Berger, Jens Happe
171
Voted
DKE
2011
260views Education» more  DKE 2011»
14 years 4 months ago
Analysis on demand: Instantaneous soundness checking of industrial business process models
We report on a case study on control-flow analysis of business process models. We checked 735 industrial business process models from financial services, telecommunications, and...
Dirk Fahland, Cédric Favre, Jana Koehler, N...
153
Voted
GECCO
2011
Springer
270views Optimization» more  GECCO 2011»
14 years 4 months ago
Geometric surrogate-based optimisation for permutation-based problems
In continuous optimisation, surrogate models (SMs) are used when tackling real-world problems whose candidate solutions are expensive to evaluate. In previous work, we showed that...
Alberto Moraglio, Yong-Hyuk Kim, Yourim Yoon
INFOCOM
2011
IEEE
14 years 4 months ago
A highly scalable bandwidth estimation of commercial hotspot access points
—WiFi access points that provide Internet access to users have been steadily increasing in urban areas. Different access points differ from one another in terms of services that ...
Xinyu Xing, Jianxun Dang, Shivakant Mishra, Xue Li...
« Prev « First page 4770 / 4949 Last » Next »