Sciweavers

2006 search results - page 349 / 402
» Heuristic Security-Testing Methods
Sort
View
ICIP
2010
IEEE
13 years 7 months ago
A game theoretical approach for image denoising
How to adaptively choose optimal neighborhoods is very important to pixel-domain image denoising algorithms since too many neighborhoods may cause over-smooth artifacts and too fe...
Yan Chen, K. J. Ray Liu
INFOCOM
2010
IEEE
13 years 7 months ago
Cooperative Bridges: Topology Control in Cooperative Wireless Ad Hoc Networks
Cooperative Communication (CC) is a technology that allows multiple nodes to simultaneously transmit the same data. It can save power and extend transmission coverage. However, pri...
Jieun Yu, Heejun Roh, Wonjun Lee, Sangheon Pack, D...
IPPS
2010
IEEE
13 years 7 months ago
Hypergraph-based task-bundle scheduling towards efficiency and fairness in heterogeneous distributed systems
This paper investigates scheduling loosely coupled task-bundles in highly heterogeneous distributed systems. Two allocation quality metrics are used in pay-per-service distributed ...
Han Zhao, Xinxin Liu, Xiaolin Li
MASS
2010
157views Communications» more  MASS 2010»
13 years 7 months ago
Spatial extension of the Reality Mining Dataset
Data captured from a live cellular network with the real users during their common daily routine help to understand how the users move within the network. Unlike the simulations wi...
Michal Ficek, Lukas Kencl
NAACL
2010
13 years 7 months ago
From Baby Steps to Leapfrog: How "Less is More" in Unsupervised Dependency Parsing
We present three approaches for unsupervised grammar induction that are sensitive to data complexity and apply them to Klein and Manning's Dependency Model with Valence. The ...
Valentin I. Spitkovsky, Hiyan Alshawi, Daniel Jura...