Sciweavers

1511 search results - page 192 / 303
» Active Risk Estimation
Sort
View
MASCOTS
2010
13 years 9 months ago
An Analytical Model with Improved Accuracy of IEEE 802.11 Protocol Under Unsaturated Conditions
In this work the authors present an analytical model that -- compared to previously published work -- more accurately captures the delay of IEEE 802.11 protocol under low, medium,...
Kumaran Vijayasankar, Azar Taufique, Lakshmi Naras...
BC
2007
107views more  BC 2007»
13 years 8 months ago
Decoding spike train ensembles: tracking a moving stimulus
We consider the issue of how to read out the information from nonstationary spike train ensembles. Based on the theory of censored data in statistics, we propose a ‘censored’ m...
Enrico Rossoni, Jianfeng Feng
SECON
2010
IEEE
13 years 6 months ago
Deconstructing Interference Relations in WiFi Networks
Abstract--Wireless interference is the major cause of degradation of capacity in 802.11 wireless networks. We present an approach to estimate the interference between nodes and lin...
Anand Kashyap, Utpal Paul, Samir R. Das

Publication
218views
12 years 16 days ago
Comparing Visual Feature Coding for Learning Disjoint Camera Dependencies
This paper systematically investigates the effectiveness of different visual feature coding schemes for facilitating the learning of time-delayed dependencies among disjoint multi-...
Xiatian Zhu, Shaogang Gong, and Chen Change Loy
KDD
2007
ACM
152views Data Mining» more  KDD 2007»
14 years 8 months ago
Privacy-Preserving Sharing of Horizontally-Distributed Private Data for Constructing Accurate Classifiers
Data mining tasks such as supervised classification can often benefit from a large training dataset. However, in many application domains, privacy concerns can hinder the construc...
Vincent Yan Fu Tan, See-Kiong Ng