Sciweavers

449 search results - page 56 / 90
» Intention-Disguised Algorithmic Trading
Sort
View
AI
2011
Springer
13 years 3 months ago
The extended global cardinality constraint: An empirical survey
The Extended Global Cardinality Constraint (EGCC) is a vital component of constraint solving systems, since it is very widely used to model diverse problems. The literature contai...
Peter Nightingale
JMLR
2010
165views more  JMLR 2010»
13 years 3 months ago
Learning with Blocks: Composite Likelihood and Contrastive Divergence
Composite likelihood methods provide a wide spectrum of computationally efficient techniques for statistical tasks such as parameter estimation and model selection. In this paper,...
Arthur Asuncion, Qiang Liu, Alexander T. Ihler, Pa...
TSP
2010
13 years 3 months ago
Energy efficient state estimation with wireless sensors through the use of predictive power control and coding
We study state estimation via wireless sensors over fading channels. Packet loss probabilities depend upon time-varying channel gains, packet lengths and transmission power levels ...
Daniel E. Quevedo, Anders Ahlén, Jan &Oslas...
CORR
2011
Springer
161views Education» more  CORR 2011»
13 years 13 days ago
A Panorama on Multiscale Geometric Representations, Intertwining Spatial, Directional and Frequency Selectivity
The richness of natural images makes the quest for optimal representations in image processing and computer vision challenging. The latter observation has not prevented the design...
Laurent Jacques, Laurent Duval, Caroline Chaux, Ga...
CAV
2011
Springer
216views Hardware» more  CAV 2011»
13 years 7 days ago
Malware Analysis with Tree Automata Inference
Abstract. The underground malware-based economy is flourishing and it is evident that the classical ad-hoc signature detection methods are becoming insufficient. Malware authors ...
Domagoj Babic, Daniel Reynaud, Dawn Song