Sciweavers

3719 search results - page 177 / 744
» order 2010
Sort
View
AUTOMATICA
2010
167views more  AUTOMATICA 2010»
15 years 4 months ago
A new kernel-based approach for linear system identification
This paper describes a new kernel-based approach for linear system identification of stable systems. We model the impulse response as the realization of a Gaussian process whose s...
Gianluigi Pillonetto, Giuseppe De Nicolao
CCR
2010
171views more  CCR 2010»
15 years 4 months ago
Fighting online click-fraud using bluff ads
Online advertising is currently the richest source of revenue for many Internet giants. The increased number of online businesses, specialized websites and modern profiling techni...
Hamed Haddadi
COMPSEC
2010
93views more  COMPSEC 2010»
15 years 4 months ago
Roving bugnet: Distributed surveillance threat and mitigation
Abstract Advanced mobile devices such as laptops and smartphones make convenient hiding places for surveillance spyware. They commonly have a microphone and camera built-in, are in...
Ryan Farley, Xinyuan Wang
CONCURRENCY
2010
110views more  CONCURRENCY 2010»
15 years 4 months ago
Redesigning the message logging model for high performance
Over the past decade the number of processors in the high performance facilities went up to hundreds of thousands. As a direct consequence, while the computational power follow th...
Aurelien Bouteiller, George Bosilca, Jack Dongarra
EJIS
2006
79views more  EJIS 2006»
15 years 4 months ago
Agility through scenario development and continuous implementation: a global aftermarket logistics case
This paper examines a business and IS/IT initiative at Volvo that involves managing the development and implementation of an agile aftermarket supply chain. The case is based on V...
Magnus Holmqvist, Kalevi Pessi