Sciweavers

236 search results - page 32 / 48
» el 2007
Sort
View
ICAIL
2007
ACM
13 years 11 months ago
How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach
Laws set requirements that force organizations to assess the security and privacy of their IT systems and impose the adoption of the implementation of minimal precautionary securi...
Luca Compagna, Paul El Khoury, Fabio Massacci, Res...
CORR
2007
Springer
128views Education» more  CORR 2007»
13 years 7 months ago
Model Selection Through Sparse Maximum Likelihood Estimation
We consider the problem of estimating the parameters of a Gaussian or binary distribution in such a way that the resulting undirected graphical model is sparse. Our approach is to...
Onureena Banerjee, Laurent El Ghaoui, Alexandre d'...
CORR
2007
Springer
131views Education» more  CORR 2007»
13 years 7 months ago
Cognitive Medium Access: Exploration, Exploitation and Competition
—This paper considers the design of efficient strategies that allow cognitive users to choose frequency bands to sense and access among multiple bands with unknown parameters. F...
Lifeng Lai, Hesham El Gamal, Hai Jiang, H. Vincent...
PR
2007
184views more  PR 2007»
13 years 7 months ago
Shape retrieval using triangle-area representation and dynamic space warping
We present a shape representation and a matching method for nonrigid shapes with closed contours. The representation utilizes the areas of the triangles formed by the boundary poi...
Naif Alajlan, Ibrahim El Rube, Mohamed S. Kamel, G...
SIPS
2007
IEEE
14 years 1 months ago
Layered Steered Space-Time Codes Using Iterative Detection
— This paper presents a novel multifunctional multiple-input multiple-output (MIMO) scheme that combines the benefits of the Vertical Bell Labs Layered Space-Time (VBLAST) schem...
Mohammed El-Hajjar, Osamah Alamri, Lajos Hanzo