Sciweavers

4277 search results - page 834 / 856
» On Multiple Linear Approximations
Sort
View
SACMAT
2009
ACM
14 years 1 months ago
Access control policy combining: theory meets practice
Many access control policy languages, e.g., XACML, allow a policy to contain multiple sub-policies, and the result of the policy on a request is determined by combining the result...
Ninghui Li, Qihua Wang, Wahbeh H. Qardaji, Elisa B...
GLOBECOM
2008
IEEE
14 years 1 months ago
Asymptotic Throughput in Wireless Multicast OFDM Systems
Abstract—With the proliferation of wireless multimedia applications, multicast/broadcast has been recognized as an efficient technique to transmit a large volume of data to mult...
Juan Liu, Wei Chen, Zhigang Cao, Ying Jun Zhang, S...
ICDM
2008
IEEE
137views Data Mining» more  ICDM 2008»
14 years 1 months ago
Stream Sequential Pattern Mining with Precise Error Bounds
Sequential pattern mining is an interesting data mining problem with many real-world applications. This problem has been studied extensively in static databases. However, in recen...
Luiz F. Mendes, Bolin Ding, Jiawei Han
VTC
2007
IEEE
130views Communications» more  VTC 2007»
14 years 1 months ago
Phase Noise Suppression in OFDM with Spatial Multiplexing
— A very promising way to achieve high spectral efficiency in wireless communication is the use of multiple transmit and receive antennas. However, in combination with multicarr...
Steffen Bittner, Wolfgang Rave, Gerhard Fettweis
ATAL
2007
Springer
14 years 1 months ago
Eliciting single-peaked preferences using comparison queries
Voting is a general method for aggregating the preferences of multiple agents. Each agent ranks all the possible alternatives, and based on this, an aggregate ranking of the alter...
Vincent Conitzer