Sciweavers

28888 search results - page 5476 / 5778
» Computability and complexity in analysis
Sort
View
SCIA
2009
Springer
305views Image Analysis» more  SCIA 2009»
15 years 10 months ago
A Convex Approach to Low Rank Matrix Approximation with Missing Data
Many computer vision problems can be formulated as low rank bilinear minimization problems. One reason for the success of these problems is that they can be efficiently solved usin...
Carl Olsson, Magnus Oskarsson
SERSCISA
2009
Springer
15 years 10 months ago
ATTENTION: ATTackEr Traceback Using MAC Layer AbNormality DetecTION
Denial-of-Service (DoS) and Distributed DoS (DDoS) attacks can cause serious problems in wireless networks due to limited network and host resources. Attacker traceback is a promi...
Yongjin Kim
ACMSE
2009
ACM
15 years 10 months ago
Applying randomized projection to aid prediction algorithms in detecting high-dimensional rogue applications
This paper describes a research effort to improve the use of the cosine similarity information retrieval technique to detect unknown, known or variances of known rogue software by...
Travis Atkison
FDG
2009
ACM
15 years 10 months ago
Exertion in networked games
Physical play familiar from sports activities is a favorite pastime across all cultures and has been attributed with many social, mental and physical health benefits. However, the...
Florian Mueller
IWCMC
2009
ACM
15 years 10 months ago
Adaptive antenna selection at mobile stations for SDMA in WiMAX networks
The IEEE 802.16/WiMAX standards has fully embraced multi-antenna technology and can, thus, deliver robust performance and high transmission rates. Nevertheless, due to its inheren...
Tairan Wang, Zhifeng Tao, Andreas F. Molisch, Phil...
« Prev « First page 5476 / 5778 Last » Next »