Sciweavers

25041 search results - page 5000 / 5009
» Algorithms for Clustering Data
Sort
View
TSP
2010
13 years 2 months ago
Improving wireless physical layer security via cooperating relays
Physical (PHY) layer security approaches for wireless communications can prevent eavesdropping without upper layer data encryption. However, they are hampered by wireless channel c...
Lun Dong, Zhu Han, Athina P. Petropulu, H. Vincent...
TSP
2010
13 years 2 months ago
Steady-state MSE performance analysis of mixture approaches to adaptive filtering
In this paper, we consider mixture approaches that adaptively combine outputs of several parallel running adaptive algorithms. These parallel units can be considered as diversity b...
Suleyman Serdar Kozat, Alper T. Erdogan, Andrew C....
CORR
2011
Springer
199views Education» more  CORR 2011»
12 years 11 months ago
Surrogate Parenthood: Protected and Informative Graphs
Many applications, including provenance and some analyses of social networks, require path-based queries over graphstructured data. When these graphs contain sensitive information...
Barbara T. Blaustein, Adriane Chapman, Len Seligma...
CVPR
2011
IEEE
12 years 11 months ago
Internal Statistics of a Single Natural Image
Statistics of ‘natural images’ provides useful priors for solving under-constrained problems in Computer Vision. Such statistics is usually obtained from large collections of ...
Maria Zontak, Michal Irani
INFOCOM
2011
IEEE
12 years 11 months ago
Taming user-generated content in mobile networks via Drop Zones
Abstract—Smartphones have changed the way people communicate. Most prominently, using commonplace mobile device features (e.g., high resolution cameras), they started producing a...
Ionut Trestian, Supranamaya Ranjan, Aleksandar Kuz...
« Prev « First page 5000 / 5009 Last » Next »