Sciweavers

53 search results - page 4 / 11
» Computing Lower Expectations with Kuznetsov's Independence C...
Sort
View
CORR
2008
Springer
146views Education» more  CORR 2008»
13 years 7 months ago
Intrusion Detection Using Cost-Sensitive Classification
Intrusion Detection is an invaluable part of computer networks defense. An important consideration is the fact that raising false alarms carries a significantly lower cost than not...
Aikaterini Mitrokotsa, Christos Dimitrakakis, Chri...
COMSWARE
2006
IEEE
14 years 1 months ago
Resource management in heterogenous wireless networks with overlapping coverage
— Development in new radio technologies and increase in user demands are driving the deployment of a wide array of wireless networks, ranging from 802.11 networks in the local ar...
Bin Bin Chen, Mun Choon Chan
CORR
2006
Springer
135views Education» more  CORR 2006»
13 years 7 months ago
An equilibrium model for matching impatient demand and patient supply over time
We present a simple dynamic equilibrium model for an online exchange where both buyers and sellers arrive according to a exogenously defined stochastic process. The structure of t...
Garud Iyengar, Anuj Kumar
SOCO
2010
Springer
13 years 2 months ago
Taximeter verification with GPS and soft computing techniques
Until recently, local governments in Spain were using machines with rolling cylinders for verifying taximeters. However, the condition of the tires can lead to errors in the proces...
José Villar, Adolfo Otero, José Oter...
SIAMSC
2010
160views more  SIAMSC 2010»
13 years 6 months ago
Shift-Invert Arnoldi Approximation to the Toeplitz Matrix Exponential
The shift-invert Arnoldi method is employed to generate an orthonormal basis from the Krylov subspace corresponding to a real Toeplitz matrix and an initial vector. The vectors and...
Spike T. Lee, Hong-Kui Pang, Hai-Wei Sun