Sciweavers

1161 search results - page 134 / 233
» Approximation schemes for clustering problems
Sort
View
TDSC
2010
218views more  TDSC 2010»
15 years 1 months ago
Secure Data Objects Replication in Data Grid
—Secret sharing and erasure coding-based approaches have been used in distributed storage systems to ensure the confidentiality, integrity, and availability of critical informati...
Manghui Tu, Peng Li, I-Ling Yen, Bhavani M. Thurai...
135
Voted
CDC
2010
IEEE
141views Control Systems» more  CDC 2010»
14 years 10 months ago
Achieving higher frequencies in large-scale nonlinear model predictive control
We present new insights into how to achieve higher frequencies in large-scale nonlinear predictive control using truncated-like schemes. The basic idea is that, instead of solving ...
Victor M. Zavala, Mihai Anitescu
MST
2006
149views more  MST 2006»
15 years 3 months ago
Parameterized Intractability of Distinguishing Substring Selection
A central question in computational biology is the design of genetic markers to distinguish between two given sets of (DNA) sequences. This question is formalized as the NP-comple...
Jens Gramm, Jiong Guo, Rolf Niedermeier
MICAI
2005
Springer
15 years 9 months ago
Proximity Searching in High Dimensional Spaces with a Proximity Preserving Order
Abstract. Kernel based methods (such as k-nearest neighbors classifiers) for AI tasks translate the classification problem into a proximity search problem, in a space that is usu...
Edgar Chávez, Karina Figueroa, Gonzalo Nava...
ICASSP
2009
IEEE
15 years 10 months ago
Two microphone based direction of arrival estimation for multiple speech sources using spectral properties of speech
A two microphone direction of arrival (DOA) estimation technique for multiple speech sources is developed which exploits speech specific properties, namely sparsity in time-frequ...
Wenyi Zhang, Bhaskar D. Rao