Sciweavers

5234 search results - page 999 / 1047
» Simulation of Computer Network Attacks
Sort
View
111
Voted
TIP
2008
126views more  TIP 2008»
15 years 2 months ago
Maximum-Entropy Expectation-Maximization Algorithm for Image Reconstruction and Sensor Field Estimation
Abstract--In this paper, we propose a maximum-entropy expectation-maximization (MEEM) algorithm. We use the proposed algorithm for density estimation. The maximum-entropy constrain...
Hunsop Hong, Dan Schonfeld
JCM
2007
156views more  JCM 2007»
15 years 2 months ago
MIMO Link Layer Transmission Techniques Based on Cross Layer Design
Abstract— In this paper, we propose and evaluate the performance of new link layer frame transmission techniques for MIMO (multiple input multiple output) wireless systems from a...
Wessam Ajib, David Haccoun, Jean-François F...
COMCOM
2004
98views more  COMCOM 2004»
15 years 2 months ago
Proactive resource provisioning
Allocating resources in networks to QoS flows may require undesirable delays or costs. We consider a dynamic Service Level Agreement (SLA) negotiation scheme between peer autonomo...
Eric Chi, Michael Fu, Jean C. Walrand
PVLDB
2010
135views more  PVLDB 2010»
15 years 26 days ago
P2PDocTagger: Content management through automated P2P collaborative tagging
As the amount of user generated content grows, personal information management has become a challenging problem. Several information management approaches, such as desktop search,...
Hock Hee Ang, Vivekanand Gopalkrishnan, Wee Keong ...
DAC
2002
ACM
16 years 3 months ago
A physical model for the transient response of capacitively loaded distributed rlc interconnects
Rapid approximation of the transient response of high-speed global interconnects is needed to estimate the time delay, crosstalk, and overshoot in a GSI multilevel wiring network....
Raguraman Venkatesan, Jeffrey A. Davis, James D. M...