Sciweavers

5516 search results - page 51 / 1104
» A Topological Approach to Recognition
Sort
View
SDM
2003
SIAM
120views Data Mining» more  SDM 2003»
13 years 11 months ago
Estimation of Topological Dimension
We present two extensions of the algorithm by Broomhead et al [2] which is based on the idea that singular values that scale linearly with the radius of the data ball can be explo...
Douglas R. Hundley, Michael J. Kirby
HICSS
2012
IEEE
296views Biometrics» more  HICSS 2012»
12 years 5 months ago
Topology Perturbation for Detecting Malicious Data Injection
Bad measurement data exists in power systems for a number of reasons. Malicious data injection attacks, which alter the values of measurements without being detected, are one pote...
K. L. Morrow, Erich Heine, Katherine M. Rogers, Ra...
SASO
2009
IEEE
14 years 4 months ago
Myconet: A Fungi-Inspired Model for Superpeer-Based Peer-to-Peer Overlay Topologies
Abstract—Unstructured peer-to-peer networks can be extremely flexible, but, because of size, complexity, and high variability in peers’ capacity and reliability, it is a conti...
Paul L. Snyder, Rachel Greenstadt, Giuseppe Valett...
ECAI
2004
Springer
14 years 3 months ago
Topological Visual Localization Using Decentralized Galois Lattices
Abstract. This paper presents a new decentralized method for selecting visual landmarks in a structured environment. Different images, issued from the different places, are analyze...
Emmanuel Zenou, Malik Ghallab, Manuel Samuelides
FTDCS
2004
IEEE
14 years 1 months ago
Random Landmarking in Mobile, Topology-Aware Peer-to-Peer Networks
DHTs can locate objects in a peer-to-peer network within an efficient amount of overlay hops. Since an overlay hop is likely to consist of multiple physical hops, the ratio betwee...
Rolf Winter, Thomas Zahn, Jochen H. Schiller