Sciweavers

3343 search results - page 606 / 669
» Network Objects
Sort
View
HASE
2008
IEEE
13 years 11 months ago
Synopsis of Evaluating Security Controls Based on Key Performance Indicators and Stakeholder Mission Value
Information security continues to evolve in response to disruptive changes with a persistent focus on information-centric controls and a healthy debate about balancing endpoint an...
Robert K. Abercrombie, Frederick T. Sheldon, Ali M...
VRML
2010
ACM
13 years 10 months ago
Remote scientific visualization of progressive 3D meshes with X3D
This paper presents a framework, integrated into the X3D file format, for the streaming of 3D content in the context of remote scientific visualization; a progressive mesh compres...
Adrien Maglo, Ho Lee, Guillaume Lavoué, Chr...
ICASSP
2010
IEEE
13 years 10 months ago
A convex relaxation for approximate maximum-likelihood 2D source localization from range measurements
This paper addresses the problem of locating a single source from noisy range measurements in wireless sensor networks. An approximate solution to the maximum likelihood location ...
Pinar Oguz-Ekim, João Pedro Gomes, Jo&atild...
CCE
2008
13 years 10 months ago
Simultaneous targeting and design for cooling water systems with multiple cooling water supplies
This paper presents a technique for simultaneous targeting and design in cooling water systems comprising of at least two cooling towers and several cooling water using operations...
Thokozani Majozi, Anand Moodley
CORR
2010
Springer
187views Education» more  CORR 2010»
13 years 10 months ago
Learning in A Changing World: Non-Bayesian Restless Multi-Armed Bandit
We consider the restless multi-armed bandit (RMAB) problem with unknown dynamics. In this problem, at each time, a player chooses K out of N (N > K) arms to play. The state of ...
Haoyang Liu, Keqin Liu, Qing Zhao