Sciweavers

5843 search results - page 1069 / 1169
» Software Security in Practice
Sort
View
JETAI
2007
131views more  JETAI 2007»
13 years 10 months ago
A computational architecture for heterogeneous reasoning
Reasoning, problem solving, indeed the general process of acquiring knowledge, is not an isolated, homogenous affair involving a one agent using a single form of representation, b...
Dave Barker-Plummer, John Etchemendy
PE
2002
Springer
176views Optimization» more  PE 2002»
13 years 9 months ago
Effective bandwidth estimation and testing for Markov sources
This work addresses the resource sharing problem in broadband communication networks that can guarantee some quality of service (QoS), and develops some results about data source ...
Juan Pechiar, Gonzalo Perera, María Simon
JSAC
2010
142views more  JSAC 2010»
13 years 8 months ago
Extreme value FEC for reliable broadcasting in wireless networks
—The advent of practical rateless codes enables implementation of highly efficient packet-level forward error correction (FEC) strategies for reliable data broadcasting in loss-...
Weiyao Xiao, David Starobinski
PKDD
2010
Springer
212views Data Mining» more  PKDD 2010»
13 years 8 months ago
Cross Validation Framework to Choose amongst Models and Datasets for Transfer Learning
Abstract. One solution to the lack of label problem is to exploit transfer learning, whereby one acquires knowledge from source-domains to improve the learning performance in the t...
ErHeng Zhong, Wei Fan, Qiang Yang, Olivier Versche...
TCOM
2010
101views more  TCOM 2010»
13 years 4 months ago
Spectral efficient transmit diversity techniques without cyclic prefix for fading relay channels
Abstract--This paper proposes spectral efficient relayassisted transmit diversity techniques, i.e., space-time and space-frequency block codes (STBC/SFBC), for single carrier frequ...
Ui-Kun Kwon, Dae-Young Seol, Gi-Hong Im
« Prev « First page 1069 / 1169 Last » Next »