Sciweavers

901 search results - page 152 / 181
» Analyzing linear mergers
Sort
View
TSMC
2011
228views more  TSMC 2011»
13 years 5 months ago
Privacy-Preserving Outlier Detection Through Random Nonlinear Data Distortion
— Consider a scenario in which the data owner has some private/sensitive data and wants a data miner to access it for studying important patterns without revealing the sensitive ...
Kanishka Bhaduri, Mark D. Stefanski, Ashok N. Sriv...
SIAMJO
2010
155views more  SIAMJO 2010»
13 years 5 months ago
Optimal Portfolio Execution Strategies and Sensitivity to Price Impact Parameters
When liquidating a portfolio of large blocks of risky assets, an institutional investor wants to minimize the cost as well as the risk of execution. An optimal execution strategy ...
Somayeh Moazeni, Thomas F. Coleman, Yuying Li
CDC
2010
IEEE
203views Control Systems» more  CDC 2010»
13 years 5 months ago
Cyber security analysis of state estimators in electric power systems
In this paper, we analyze the cyber security of state estimators in Supervisory Control and Data Acquisition (SCADA) systems operating in power grids. Safe and reliable operation o...
André Teixeira, Saurabh Amin, Henrik Sandbe...
CORR
2011
Springer
186views Education» more  CORR 2011»
13 years 2 months ago
Blind Compressed Sensing Over a Structured Union of Subspaces
—This paper addresses the problem of simultaneous signal recovery and dictionary learning based on compressive measurements. Multiple signals are analyzed jointly, with multiple ...
Jorge Silva, Minhua Chen, Yonina C. Eldar, Guiller...
RECOMB
2009
Springer
14 years 11 months ago
Shared Peptides in Mass Spectrometry Based Protein Quantification
In analyzing the proteome using mass spectrometry, the mass values help identify the molecules, and the intensities help quantify them, relative to their abundance in other sample...
Banu Dost, Nuno Bandeira, Xiangqian Li, Zhouxin Sh...