Sciweavers

59 search results - page 5 / 12
» Analysis of greedy approximations with nonsubmodular potenti...
Sort
View
CNSR
2008
IEEE
155views Communications» more  CNSR 2008»
14 years 1 months ago
Detecting Network Anomalies Using Different Wavelet Basis Functions
Signal processing techniques have been applied recently for analyzing and detecting network anomalies due to their potential to find novel or unknown intrusions. In this paper, we...
Wei Lu, Mahbod Tavallaee, Ali A. Ghorbani
ISAAC
2010
Springer
291views Algorithms» more  ISAAC 2010»
13 years 4 months ago
A Tighter Analysis of Work Stealing
Abstract. Classical list scheduling is a very popular and efficient technique for scheduling jobs in parallel platforms. However, with the increasing number of processors, the cost...
Marc Tchiboukdjian, Nicolas Gast, Denis Trystram, ...
SMI
2003
IEEE
223views Image Analysis» more  SMI 2003»
14 years 8 days ago
Skeleton Extraction of 3D Objects with Radial Basis Functions
Skeleton is a lower dimensional shape description of an object. The requirements of a skeleton differ with applications. For example, object recognition requires skeletons with pr...
Wan-Chun Ma, Fu-Che Wu, Ming Ouhyoung
TCOM
2008
83views more  TCOM 2008»
13 years 6 months ago
Toward a unified framework for modeling and analysis of diversity in joint source-channel coding
The study of Joint Source-Channel Coding (JSCC) systems faces one major challenge in obtaining an analytical expression for the function that links end-to-end distortion with chann...
Andres Kwasinski, K. J. Ray Liu
SMI
2008
IEEE
108views Image Analysis» more  SMI 2008»
14 years 1 months ago
Variational Multilevel Mesh Clustering
In this paper a novel clustering algorithm is proposed, namely Variational Multilevel Mesh Clustering (VMLC). The algorithm incorporates the advantages of both hierarchical and va...
Iurie Chiosa, Andreas Kolb