We present two extensions of the algorithm by Broomhead et al [2] which is based on the idea that singular values that scale linearly with the radius of the data ball can be explo...
Bad measurement data exists in power systems for a number of reasons. Malicious data injection attacks, which alter the values of measurements without being detected, are one pote...
K. L. Morrow, Erich Heine, Katherine M. Rogers, Ra...
Abstract—Unstructured peer-to-peer networks can be extremely flexible, but, because of size, complexity, and high variability in peers’ capacity and reliability, it is a conti...
Paul L. Snyder, Rachel Greenstadt, Giuseppe Valett...
Abstract. This paper presents a new decentralized method for selecting visual landmarks in a structured environment. Different images, issued from the different places, are analyze...
DHTs can locate objects in a peer-to-peer network within an efficient amount of overlay hops. Since an overlay hop is likely to consist of multiple physical hops, the ratio betwee...