Sciweavers

1937 search results - page 126 / 388
» Starting B Specifications from Use Cases
Sort
View
JSAC
2006
107views more  JSAC 2006»
15 years 4 months ago
Adaptive Sensor Activity Control in Many-to-One Sensor Networks
Abstract--In this paper, we consider a many-to-one sensor network where a large number of sensors are deployed to monitor a physical environment. We explore sensor activity managem...
Zhifeng Hu, Junshan Zhang, Lang Tong
KDD
2007
ACM
178views Data Mining» more  KDD 2007»
16 years 5 months ago
Practical learning from one-sided feedback
In many data mining applications, online labeling feedback is only available for examples which were predicted to belong to the positive class. Such applications include spam filt...
D. Sculley
CRYPTO
2005
Springer
171views Cryptology» more  CRYPTO 2005»
15 years 10 months ago
On Codes, Matroids and Secure Multi-party Computation from Linear Secret Sharing Schemes
Error correcting codes and matroids have been widely used in the study of ordinary secret sharing schemes. In this paper, we study the connections between codes, matroids, and a s...
Ronald Cramer, Vanesa Daza, Ignacio Gracia, Jorge ...
TSP
2008
76views more  TSP 2008»
15 years 4 months ago
Eigenvalue Beamforming Using a Multirank MVDR Beamformer and Subspace Selection
Abstract--We derive eigenvalue beamformers to resolve an unknown signal of interest whose spatial signature lies in a known subspace, but whose orientation in that subspace is othe...
Ali Pezeshki, B. D. Van Veen, Louis L. Scharf, H. ...
PROFES
2004
Springer
15 years 10 months ago
Using a Reference Application with Design Patterns to Produce Industrial Software
Abstract. System architectures are described in abstract terms, often using Design Patterns. Actual reuse based on such descriptions requires that each development project derive a...
Marek Vokác, Oluf Jensen