Sciweavers

5580 search results - page 944 / 1116
» Randomized priority algorithms
Sort
View
DAWAK
2009
Springer
14 years 4 months ago
Dynamic Clustering-Based Estimation of Missing Values in Mixed Type Data
The appropriate choice of a method for imputation of missing data becomes especially important when the fraction of missing values is large and the data are of mixed type. The prop...
Vadim V. Ayuyev, Joseph Jupin, Philip W. Harris, Z...
DATE
2009
IEEE
167views Hardware» more  DATE 2009»
14 years 4 months ago
Analyzing the impact of process variations on parametric measurements: Novel models and applications
Abstract—In this paper we propose a novel statistical framework to model the impact of process variations on semiconductor circuits through the use of process sensitive test stru...
Sherief Reda, Sani R. Nassif
ICASSP
2009
IEEE
14 years 4 months ago
Delay-based overlay construction in P2P video broadcast
We consider streaming video content over an overlay network of peer nodes. Each of the nodes employs a mesh-pull mechanism to organize the download of data units from its neighbou...
Jacob Chakareski, Pascal Frossard
SP
2009
IEEE
262views Security Privacy» more  SP 2009»
14 years 4 months ago
Automatic Reverse Engineering of Malware Emulators
Malware authors have recently begun using emulation technology to obfuscate their code. They convert native malware binaries into bytecode programs written in a randomly generated...
Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffi...
ISCC
2009
IEEE
152views Communications» more  ISCC 2009»
14 years 4 months ago
Perceptual based voice multi-hop transmission over wireless sensor networks
Abstract—Multimedia applications over wireless sensor networks (WSNs) are rapidly gaining interest by the research community in order to develop new and mission critical services...
M. Petracca, G. Litovsky, A. Rinotti, Marco Tacca,...