Sciweavers

532 search results - page 66 / 107
» Extending Scalar Multiplication Using Double Bases
Sort
View
WISE
2000
Springer
14 years 1 months ago
VideoMAP*: A Web-based Architecture for a Spatio-Temporal Video Database Management System
In this paper, we present a web-based architecture of a spatiotemporal video data management system, which can accommodate a wide range of activities by various types of users. Be...
Shermann S.-M. Chan, Qing Li
SIMPRA
2008
99views more  SIMPRA 2008»
13 years 8 months ago
Response surface methodology for constrained simulation optimization: An overview
This article summarizes `Generalized Response Surface Methodology'(GRSM), extending Box and Wilson's `Response Surface Methodology'(RSM). GRSM allows multiple rando...
Jack P. C. Kleijnen
GPEM
2010
134views more  GPEM 2010»
13 years 7 months ago
An ensemble-based evolutionary framework for coping with distributed intrusion detection
A distributed data mining algorithm to improve the detection accuracy when classifying malicious or unauthorized network activity is presented. The algorithm is based on genetic p...
Gianluigi Folino, Clara Pizzuti, Giandomenico Spez...
ICASSP
2009
IEEE
13 years 6 months ago
A MIMO-OFDM channel estimation scheme utilizing complementary sequences
We present a pilot-assisted method for estimating the frequency selective channel in a MIMO-OFDM system. The pilot sequence is designed using the DFT of the Golay complementary se...
Tariq R. Qureshi, Michael D. Zoltowski, A. Robert ...
SACMAT
2009
ACM
14 years 3 months ago
Symbolic reachability analysis for parameterized administrative role based access control
Role based access control (RBAC) is a widely used access control paradigm. In large organizations, the RBAC policy is managed by multiple administrators. An administrative role ba...
Scott D. Stoller, Ping Yang, Mikhail I. Gofman, C....