Sciweavers

2006 search results - page 313 / 402
» Heuristic Security-Testing Methods
Sort
View
VTC
2007
IEEE
14 years 3 months ago
Power Allocation Scheme for MIMO MC-CDMA With Two Dimensional Spreading
— In this paper, we develop a power distribution scheme for multi-input multi-output (MIMO) [1] multi-carrier (MC) code division multiple access (CDMA) systems [2]-[3] with two-d...
Wladimir Bocquet, Kazunori Hayashi, Hideaki Sakai
IROS
2007
IEEE
110views Robotics» more  IROS 2007»
14 years 3 months ago
Multi-agent search with interim positive information
– A problem of searching with multiple searchers and scouts is presented. Unlike most search problems that terminate as soon as the target is found, successful detections by scou...
Haye Lau, Shoudong Huang, Gamini Dissanayake
AMR
2007
Springer
143views Multimedia» more  AMR 2007»
14 years 3 months ago
User Modelling for Interactive User-Adaptive Collection Structuring
Abstract. Automatic structuring is one means to ease access to document collections, be it for organization or for exploration. Of even greater help would be a presentation that ad...
Andreas Nürnberger, Sebastian Stober
CPAIOR
2007
Springer
14 years 3 months ago
YIELDS: A Yet Improved Limited Discrepancy Search for CSPs
Abstract. In this paper, we introduce a Yet ImprovEd Limited Discrepancy Search (YIELDS), a complete algorithm for solving Constraint Satisfaction Problems. As indicated in its nam...
Wafa Karoui, Marie-José Huguet, Pierre Lope...
ECML
2007
Springer
14 years 3 months ago
Learning an Outlier-Robust Kalman Filter
We introduce a modified Kalman filter that performs robust, real-time outlier detection, without the need for manual parameter tuning by the user. Systems that rely on high quali...
Jo-Anne Ting, Evangelos Theodorou, Stefan Schaal