Sciweavers

1399 search results - page 181 / 280
» New Algorithms for k-Center and Extensions
Sort
View
DATE
2009
IEEE
129views Hardware» more  DATE 2009»
14 years 3 months ago
Improved performance and variation modelling for hierarchical-based optimisation of analogue integrated circuits
A new approach in hierarchical optimisation is presented which is capable of optimising both the performance and yield of an analogue design. Performance and yield trade offs are ...
Sawal Ali, Li Ke, Reuben Wilcock, Peter Wilson
ICANN
2009
Springer
14 years 3 months ago
Basis Decomposition of Motion Trajectories Using Spatio-temporal NMF
Abstract. This paper’s intention is to present a new approach for decomposing motion trajectories. The proposed algorithm is based on nonnegative matrix factorization, which is a...
Sven Hellbach, Julian Eggert, Edgar Körner, H...
ISM
2008
IEEE
98views Multimedia» more  ISM 2008»
14 years 3 months ago
Protecting SIP Proxy Servers from Ringing-Based Denial-of-Service Attacks
As Internet telephony systems continue to replace existing Public Switched Telephone Network systems, proxy servers running the Session Initiation Protocol (SIP) will continue to ...
William Conner, Klara Nahrstedt
SSDBM
2008
IEEE
150views Database» more  SSDBM 2008»
14 years 3 months ago
Summarizing Two-Dimensional Data with Skyline-Based Statistical Descriptors
Much real data consists of more than one dimension, such as financial transactions (eg, price × volume) and IP network flows (eg, duration × numBytes), and capture relationship...
Graham Cormode, Flip Korn, S. Muthukrishnan, Dives...
BROADNETS
2007
IEEE
14 years 3 months ago
Detecting protected layer-3 rogue APs
— Unauthorized rogue access points (APs), such as those brought into a corporate campus by employees, pose a security threat as they may be poorly managed or insufficiently secu...
Hongda Yin, Guanling Chen, Jie Wang