Sciweavers

4307 search results - page 579 / 862
» Dynamic Spyware Analysis
Sort
View
JNS
2008
63views more  JNS 2008»
15 years 2 months ago
Numerical Continuation of Hamiltonian Relative Periodic Orbits
The bifurcation theory and numerics of periodic orbits of general dynamical systems is well developed, and in recent years there has been rapid progress in the development of a bi...
Claudia Wulff, Andreas Schebesch
149
Voted
CSL
2007
Springer
15 years 2 months ago
Speaker-adaptive learning of resonance targets in a hidden trajectory model of speech coarticulation
A novel speaker-adaptive learning algorithm is developed and evaluated for a hidden trajectory model of speech coarticulation and reduction. Central to this model is the process o...
Dong Yu, Li Deng, Alex Acero
154
Voted
PE
2006
Springer
114views Optimization» more  PE 2006»
15 years 2 months ago
On the performance of Internet worm scanning strategies
In recent years, fast spreading worms, such as Code Red, Slammer, Blaster and Sasser, have become one of the major threats to the security of the Internet. In order to defend agai...
Cliff Changchun Zou, Donald F. Towsley, Weibo Gong
117
Voted
JSS
2007
93views more  JSS 2007»
15 years 2 months ago
Resource management for real-time tasks in mobile robotics
Coordinated behavior of mobile robots is an important emerging application area. Different coordinated behaviors can be achieved by assigning sets of control tasks, or strategies...
Huan Li, Krithi Ramamritham, Prashant J. Shenoy, R...
122
Voted
TWC
2008
238views more  TWC 2008»
15 years 2 months ago
Downlink resource allocation in multi-carrier systems: frequency-selective vs. equal power allocation
In this paper, a dynamic subcarrier and power allocation problem is considered in the context of asymptotic utility maximization in multi-carrier systems. Using the gradient-based...
Hyang-Won Lee, Song Chong