Sciweavers

796 search results - page 69 / 160
» Spoofing prevention method
Sort
View
ICASSP
2010
IEEE
13 years 10 months ago
Structuring a gene network using a multiresolution independence test
In order to structure a gene network, a score-based approach is often used. A score-based approach, however, is problematic because by assuming a probability distribution, one is ...
Takayuki Yamamoto, Tetsuya Takiguchi, Yasuo Ariki
AUTOMATICA
2010
90views more  AUTOMATICA 2010»
13 years 10 months ago
A line search improvement of efficient MPC
A recent lifting technique led to a computationally efficient Model Predictive Control (MPC) strategy in which the online optimization is performed using a univariate Newton-Raphs...
Basil Kouvaritakis, Shuang Li, Mark Cannon
CORR
2008
Springer
84views Education» more  CORR 2008»
13 years 10 months ago
Message-Passing Decoding of Lattices Using Gaussian Mixtures
A belief-propagation decoder for low-density lattice codes, which represents messages explicitly as a mixture of Gaussians functions, is given. In order to prevent the mixture elem...
Brian M. Kurkoski, Justin Dauwels
CORR
2010
Springer
167views Education» more  CORR 2010»
13 years 10 months ago
Security Mitigations for Return-Oriented Programming Attacks
With the discovery of new exploit techniques, new protection mechanisms are needed as well. Mitigations like DEP (Data Execution Prevention) or ASLR (Address Space Layout Randomiz...
Piotr Bania
KBS
2008
83views more  KBS 2008»
13 years 10 months ago
Rule-based and case-based reasoning approach for internal audit of bank
Banks currently have a great interest in internal audits to reduce risks, to prevent themselves from insolvency, and to take quick action for financial incidents. This study prese...
Gun Ho Lee