Sciweavers

734 search results - page 132 / 147
» Computer Virus Propagation Models
Sort
View
IJAR
2006
98views more  IJAR 2006»
13 years 7 months ago
Inference in hybrid Bayesian networks with mixtures of truncated exponentials
Mixtures of truncated exponentials (MTE) potentials are an alternative to discretization for solving hybrid Bayesian networks. Any probability density function can be approximated...
Barry R. Cobb, Prakash P. Shenoy

Publication
145views
13 years 3 months ago
Wireless Client Puzzles in IEEE 802.11 Networks: Security by Wireless
Resource-depletion attacks against IEEE 802.11 access points (APs) are commonly executed by flooding APs with fake authentication requests. Such attacks may exhaust an AP’s memor...
Ivan Martinovic, Frank A. Zdarsky, Matthias Wilhel...
CORR
2011
Springer
160views Education» more  CORR 2011»
13 years 2 months ago
Provenance for Aggregate Queries
We study in this paper provenance information for queries with aggregation. Provenance information was studied in the context of various query languages that do not allow for aggr...
Yael Amsterdamer, Daniel Deutch, Val Tannen
CORR
2011
Springer
191views Education» more  CORR 2011»
13 years 2 months ago
A Message-Passing Receiver for BICM-OFDM over Unknown Clustered-Sparse Channels
We propose a factor-graph-based approach to joint channel-estimationand-decoding of bit-interleaved coded orthogonal frequency division multiplexing (BICM-OFDM). In contrast to ex...
Philip Schniter
ICCV
2005
IEEE
14 years 9 months ago
Incorporating Visual Knowledge Representation in Stereo Reconstruction
In this paper, we present a two-layer generative model that incorporates generic middle-level visual knowledge for dense stereo reconstruction. The visual knowledge is represented...
Adrian Barbu, Song Chun Zhu