Sciweavers

235 search results - page 40 / 47
» A comparison of normal estimation schemes
Sort
View
NIPS
2003
13 years 9 months ago
A Classification-based Cocktail-party Processor
At a cocktail party, a listener can selectively attend to a single voice and filter out other acoustical interferences. How to simulate this perceptual ability remains a great cha...
Nicoleta Roman, DeLiang L. Wang, Guy J. Brown
KDD
2009
ACM
173views Data Mining» more  KDD 2009»
14 years 10 days ago
Malware detection using statistical analysis of byte-level file content
Commercial anti-virus software are unable to provide protection against newly launched (a.k.a “zero-day”) malware. In this paper, we propose a novel malware detection techniqu...
S. Momina Tabish, M. Zubair Shafiq, Muddassar Faro...
WS
2004
ACM
14 years 1 months ago
SeRLoc: secure range-independent localization for wireless sensor networks
In many applications of wireless sensor networks (WSN), sensors are deployed un-tethered in hostile environments. For locationaware WSN applications, it is essential to ensure tha...
Loukas Lazos, Radha Poovendran
JSAC
2007
117views more  JSAC 2007»
13 years 7 months ago
Optimization of Training and Scheduling in the Non-Coherent SIMO Multiple Access Channel
— Channel state information (CSI) is important for achieving large rates in MIMO channels. However, in timevarying MIMO channels, there is a tradeoff between the time/energy spen...
Sugumar Murugesan, Elif Uysal-Biyikoglu, Philip Sc...
TMC
2002
106views more  TMC 2002»
13 years 7 months ago
Optimal Resource Management in Wireless Multimedia Wideband CDMA Systems
This paper proposes a scheme of optimal resource management for reverse-link transmissions in multimedia wideband code-division multiple-access (WCDMA) communications. It is to gua...
Majid Soleimanipour, Weihua Zhuang, George H. Free...