Sciweavers

1161 search results - page 134 / 233
» Approximation schemes for clustering problems
Sort
View
TDSC
2010
218views more  TDSC 2010»
13 years 7 months ago
Secure Data Objects Replication in Data Grid
—Secret sharing and erasure coding-based approaches have been used in distributed storage systems to ensure the confidentiality, integrity, and availability of critical informati...
Manghui Tu, Peng Li, I-Ling Yen, Bhavani M. Thurai...
CDC
2010
IEEE
141views Control Systems» more  CDC 2010»
13 years 4 months ago
Achieving higher frequencies in large-scale nonlinear model predictive control
We present new insights into how to achieve higher frequencies in large-scale nonlinear predictive control using truncated-like schemes. The basic idea is that, instead of solving ...
Victor M. Zavala, Mihai Anitescu
MST
2006
149views more  MST 2006»
13 years 9 months ago
Parameterized Intractability of Distinguishing Substring Selection
A central question in computational biology is the design of genetic markers to distinguish between two given sets of (DNA) sequences. This question is formalized as the NP-comple...
Jens Gramm, Jiong Guo, Rolf Niedermeier
MICAI
2005
Springer
14 years 2 months ago
Proximity Searching in High Dimensional Spaces with a Proximity Preserving Order
Abstract. Kernel based methods (such as k-nearest neighbors classifiers) for AI tasks translate the classification problem into a proximity search problem, in a space that is usu...
Edgar Chávez, Karina Figueroa, Gonzalo Nava...
ICASSP
2009
IEEE
14 years 3 months ago
Two microphone based direction of arrival estimation for multiple speech sources using spectral properties of speech
A two microphone direction of arrival (DOA) estimation technique for multiple speech sources is developed which exploits speech specific properties, namely sparsity in time-frequ...
Wenyi Zhang, Bhaskar D. Rao