Sciweavers

1763 search results - page 262 / 353
» Dependent random choice
Sort
View
CISIM
2008
IEEE
14 years 2 months ago
Evolution Induced Secondary Immunity: An Artificial Immune System Based Intrusion Detection System
The analogy between Immune Systems and Intrusion Detection Systems encourage the use of Artificial Immune Systems for anomaly detection in computer networks. This paper describes ...
Divyata Dal, Siby Abraham, Ajith Abraham, Sugata S...
CISS
2008
IEEE
14 years 2 months ago
Near optimal lossy source coding and compression-based denoising via Markov chain Monte Carlo
— We propose an implementable new universal lossy source coding algorithm. The new algorithm utilizes two wellknown tools from statistical physics and computer science: Gibbs sam...
Shirin Jalali, Tsachy Weissman
CISS
2008
IEEE
14 years 2 months ago
On the delay and throughput of digital and analog network coding for wireless broadcast
— We address the problem of exchanging broadcast packets among multiple wireless terminals through a single relay node. The objective is to evaluate the delay and throughput gain...
Yalin Evren Sagduyu, Dongning Guo, Randall Berry
CISS
2008
IEEE
14 years 2 months ago
Dynamic data compression for wireless transmission over a fading channel
—We consider a wireless node that randomly receives data from different sensor units. The arriving data must be compressed, stored, and transmitted over a wireless link, where bo...
Michael J. Neely
ICASSP
2008
IEEE
14 years 2 months ago
Learning with noisy supervision for Spoken Language Understanding
Data-driven Spoken Language Understanding (SLU) systems need semantically annotated data which are expensive, time consuming and prone to human errors. Active learning has been su...
Christian Raymond, G. Riccardfi