Sciweavers

460 search results - page 72 / 92
» A Symmetric Convexity Measure
Sort
View
JMIV
2010
131views more  JMIV 2010»
13 years 6 months ago
An SL(2) Invariant Shape Median
Median averaging is a powerful averaging concept on sets of vector data in finite dimensions. A generalization of the median for shapes in the plane is introduced. The underlying ...
Benjamin Berkels, Gina Linkmann, Martin Rumpf
JSAC
2010
86views more  JSAC 2010»
13 years 6 months ago
A randomized countermeasure against parasitic adversaries in wireless sensor networks
—Due to their limited capabilities, wireless sensor nodes are subject to physical attacks that are hard to defend against. In this paper, we first identify a typical attacker, c...
Panagiotis Papadimitratos, Jun Luo, Jean-Pierre Hu...
NN
2010
Springer
125views Neural Networks» more  NN 2010»
13 years 6 months ago
Parameter-exploring policy gradients
We present a model-free reinforcement learning method for partially observable Markov decision problems. Our method estimates a likelihood gradient by sampling directly in paramet...
Frank Sehnke, Christian Osendorfer, Thomas Rü...
CDC
2010
IEEE
137views Control Systems» more  CDC 2010»
13 years 2 months ago
Control of large 1D networks of double integrator agents: Role of heterogeneity and asymmetry on stability margin
We consider the distributed control of a network of heterogeneous agents with double integrator dynamics to maintain a rigid formation in 1D. The control signal at a vehicle is all...
He Hao, Prabir Barooah
JDCTA
2010
150views more  JDCTA 2010»
13 years 2 months ago
Provable Password-Authenticated Key Exchange Protocol against Imposter Attack on Ad Hoc Networks
In wireless ad hoc networks environment, Bellovin and Merritt first developed a password-based Encrypted Key Exchange (EKE) protocol against offline dictionary attacks using both ...
Ang Gao