Sciweavers

1945 search results - page 355 / 389
» Pursuit-Evasion in Models of Complex Networks
Sort
View
IJCNN
2007
IEEE
14 years 2 months ago
On Extending the SMO Algorithm Sub-Problem
—The Support Vector Machine is a widely employed machine learning model due to its repeatedly demonstrated superior generalization performance. The Sequential Minimal Optimizatio...
Christopher Sentelle, Michael Georgiopoulos, Georg...
SRDS
2007
IEEE
14 years 2 months ago
An Analytical Framework and Its Applications for Studying Brick Storage Reliability
The reliability of a large-scale storage system is influenced by a complex set of inter-dependent factors. This paper presents a comprehensive and extensible analytical framework ...
Ming Chen, Wei Chen, Likun Liu, Zheng Zhang
VTC
2007
IEEE
14 years 2 months ago
Power Optimization of IDMA Systems with Different Target BER Constraints
— Interleave Division Multiple Access (IDMA) is a promising air interface for future wireless networks. Optimization of access schemes regarding cross user aspects is also a topi...
Petra Weitkemper, Karl-Dirk Kammeyer
ESORICS
2007
Springer
14 years 2 months ago
Synthesizing Secure Protocols
Abstract. We propose a general transformation that maps a cryptographic protocol that is secure in an extremely weak sense (essentially in a model where no adversary is present) in...
Véronique Cortier, Bogdan Warinschi, Eugen ...
EUROPAR
2007
Springer
14 years 2 months ago
Esodyp+: Prefetching in the Jackal Software DSM
Abstract. Prefetching transfers a data item in advance from its storage location to its usage location so that communication is hidden and does not delay computation. We present a ...
Michael Klemm, Jean Christophe Beyler, Ronny T. La...