Sciweavers

3154 search results - page 138 / 631
» Computing Closed Skycubes
Sort
View
ICNS
2008
IEEE
14 years 4 months ago
Effairness: Dealing with Time in Congestion Control Evaluation
Congestion control algorithms are traditionally evaluated in contrast to ideal capacity allocations that specify instantaneous efficient fair rates for application sessions but i...
Sergey Gorinsky, Harrick M. Vin
WG
2007
Springer
14 years 4 months ago
Lower Bounds for Three Algorithms for the Transversal Hypergraph Generation
Abstract. The computation of all minimal transversals of a given hypergraph in output-polynomial time is a long standing open question known as the transversal hypergraph generatio...
Matthias Hagen
CCECE
2006
IEEE
14 years 4 months ago
Group-Optimal Linear Space-Time Multiuser Detection
Multiuser detection (MUD) techniques are known to improve the performance of CDMA cellular communication systems. This performance improvement usually comes at a large computation...
Benoit Pelletier, Benoît Champagne
ACSC
2005
IEEE
14 years 3 months ago
Unsupervised Anomaly Detection in Network Intrusion Detection Using Clusters
Most current network intrusion detection systems employ signature-based methods or data mining-based methods which rely on labelled training data. This training data is typically ...
Kingsly Leung, Christopher Leckie
SCALESPACE
2005
Springer
14 years 3 months ago
Matrix-Valued Filters as Convex Programs
Matrix-valued images gain increasing importance both as the output of new imaging techniques and as the result of image processing operations, bearing the need for robust and effic...
Martin Welk, Florian Becker, Christoph Schnör...