Sciweavers

700 search results - page 52 / 140
» words 2005
Sort
View
AINA
2005
IEEE
15 years 3 months ago
Reducing Security Overhead for Mobile Networks
Security of mobile communications comes with the cost of computational overhead. Reducing the overhead in security computations is critical to ensure the overall performance of a ...
Fangguo Zhang, Yi Mu, Willy Susilo
AUTOMATICA
2005
155views more  AUTOMATICA 2005»
14 years 9 months ago
Identification of MIMO Hammerstein models using least squares support vector machines
This paper studies a method for the identification of Hammerstein models based on Least Squares Support Vector Machines (LS-SVMs). The technique allows for the determination of th...
Ivan Goethals, Kristiaan Pelckmans, Johan A. K. Su...
ENC
2005
IEEE
15 years 3 months ago
Inferring acceptable arguments with Answer Set Programming
Following the argumentation framework and semantics proposed by Dung, we are interested in the problem of deciding which set of acceptable arguments support the decision making in...
Mauricio Osorio, Claudia Zepeda, Juan Carlos Nieve...
ATS
2005
IEEE
56views Hardware» more  ATS 2005»
15 years 3 months ago
Investigations of Faulty DRAM Behavior Using Electrical Simulation Versus an Analytical Approach
Abstract: Fabrication process improvements and technology scaling results in modifications in the characteristics and in the behavior of manufactured memory chips, which also modi...
Zaid Al-Ars, Said Hamdioui, Jörg E. Vollrath
ICDAR
2005
IEEE
15 years 3 months ago
Enhancing Training Data for Handwriting Recognition of Whiteboard Notes with Samples from a Different Database
Recognition of unconstrained handwritten text is still a challenge. In this paper we consider a new problem, which is the recognition of notes written on a whiteboard. Our recogni...
Marcus Liwicki, Horst Bunke