Sciweavers

2038 search results - page 281 / 408
» Loops under Strategies
Sort
View
HICSS
2008
IEEE
118views Biometrics» more  HICSS 2008»
15 years 11 months ago
Geographically Distributed Enterprise Architecting: Towards a Theoretical Framework
Enterprise architecting is becoming critical for most modern organizations whose competitive strategies are tightly linked to the underlying information technology (IT) infrastruc...
J. Alberto Espinosa, Frank Armour
HOST
2008
IEEE
15 years 11 months ago
Detecting Malicious Inclusions in Secure Hardware: Challenges and Solutions
This paper addresses a new threat to the security of integrated circuits (ICs) used in safety critical, security and military systems. The migration of IC fabrication to low-cost ...
Xiaoxiao Wang, Mohammad Tehranipoor, Jim Plusquell...
ICASSP
2008
IEEE
15 years 11 months ago
Path-constrained partial music synchronization
Digital music collections often contain different versions and interpretations of a single musical work. In view of music retrieval and browsing applications, one important task, ...
Meinard Mueller, Daniel Appelt
ICASSP
2008
IEEE
15 years 11 months ago
Utility-based power control for peer-to-peer cognitive radio networks with heterogeneous QoS constraints
Transmit-power control is a critical task in cognitive radio (CR) networks. In the present contribution, adherence to hierarchies between primary and secondary users in a peer-to-...
Nikolaos Gatsis, Antonio G. Marqués, Georgi...
ICASSP
2008
IEEE
15 years 11 months ago
A new Particle Filtering algorithm with structurally optimal importance function
Bayesian estimation in nonlinear stochastic dynamical systems has been addressed for a long time. Among other solutions, Particle Filtering (PF) algorithms propagate in time a Mon...
Boujemaa Ait-El-Fquih, François Desbouvries