Sciweavers

1245 search results - page 145 / 249
» Playing with Conway's problem
Sort
View
ICDM
2008
IEEE
142views Data Mining» more  ICDM 2008»
14 years 4 months ago
Clustering Events on Streams Using Complex Context Information
Monitoring applications play an increasingly important role in many domains. They detect events in monitored systems and take actions such as invoke a program or notify an adminis...
YongChul Kwon, Wing Yee Lee, Magdalena Balazinska,...
ICPR
2008
IEEE
14 years 4 months ago
A network intrusion detection method using independent component analysis
An intrusion detection system (IDS) detects illegal manipulations of computer systems. In intrusion detection systems, feature reduction, including feature extraction and feature ...
Dayu Yang, Hairong Qi
ICRA
2008
IEEE
163views Robotics» more  ICRA 2008»
14 years 4 months ago
Dealing with laser scanner failure: Mirrors and windows
— This paper addresses the problem of laser scanner failure on mirrors and windows. Mirrors and glasses are quite common objects that appear in our daily lives. However, while la...
Shao-Wen Yang, Chieh-Chih Wang
IPPS
2008
IEEE
14 years 4 months ago
SLA-based resource allocation in cluster computing systems
Resource allocation is a fundamental but challenging problem due to the complexity of cluster computing systems. In enterprise service computing, resource allocation is often asso...
Kaiqi Xiong, Harry G. Perros
VTC
2008
IEEE
218views Communications» more  VTC 2008»
14 years 4 months ago
Performance Analysis of a System using Coordinate Interleaving and Constellation Rotation in Rayleigh Fading Channels
Abstract— Diversity can play an important role in the performance improvement of a communication system in fading channels. The achievable performance with signal space diversity...
Nauman F. Kiyani, Jos H. Weber, Alenka G. Zajic, G...