Sciweavers

1282 search results - page 218 / 257
» Practical Loss-Resilient Codes
Sort
View
DSS
2007
75views more  DSS 2007»
13 years 8 months ago
Short Term and Total Life Impact analysis of email worms in computer systems
This paper develops a methodology for analyzing and predicting the impact category of malicious code, particularly email worms. The current paper develops two frameworks to classi...
Insu Park, Raj Sharman, H. Raghav Rao, Shambhu J. ...
JMLR
2006
156views more  JMLR 2006»
13 years 8 months ago
Large Scale Multiple Kernel Learning
While classical kernel-based learning algorithms are based on a single kernel, in practice it is often desirable to use multiple kernels. Lanckriet et al. (2004) considered conic ...
Sören Sonnenburg, Gunnar Rätsch, Christi...
JSAC
2006
78views more  JSAC 2006»
13 years 8 months ago
On the optimality of multiantenna broadcast scheduling using zero-forcing beamforming
Abstract--Although the capacity of multiple-input/multipleoutput (MIMO) broadcast channels (BCs) can be achieved by dirty paper coding (DPC), it is difficult to implement in practi...
Taesang Yoo, Andrea J. Goldsmith
ENVSOFT
2007
126views more  ENVSOFT 2007»
13 years 8 months ago
Uncertainty and precaution in environmental management: Insights from the UPEM conference
Communication across the science-policy interface is complicated by uncertainty and ignorance associated with predictions on which to base policies. The international symposium â€...
Jeroen P. van der Sluijs
JSS
2006
88views more  JSS 2006»
13 years 8 months ago
A formal representation of functional size measurement methods
Estimating software size is a difficult task that requires a methodological approach. Many different methods that exist today use distinct abstractions to depict a software system...
Marjan Hericko, Ivan Rozman, Ales Zivkovic