Sciweavers

702 search results - page 92 / 141
» Boosting in the presence of noise
Sort
View
ICWN
2009
13 years 6 months ago
Threshold Secret Sharing Authentication Scheme in Noisy Mobile Ad Hoc Networks
- This paper presents a description and performance evaluation of a threshold secret sharing (TSS) authentication scheme for selfsecuring mobile ad hoc networks (MANETs) suffering ...
Shakir Hussain, Hussein Al-Bahadili, Ghassan Issa,...
AND
2009
13 years 6 months ago
Cohen's class distributions for skew angle estimation in noisy ancient Arabic documents
This paper presents an adaptive method for the skew angle estimation of noisy handwritten Arabic documents using the energy distributions of Cohen’s class. The presence of noise...
Nazih Ouwayed, Abdel Belaïd, François ...
CORR
2010
Springer
179views Education» more  CORR 2010»
13 years 6 months ago
Algebraic Constructions of Graph-Based Nested Codes from Protographs
Nested codes have been employed in a large number of communication applications as a specific case of superposition codes, for example to implement binning schemes in the presence ...
Christine A. Kelley, Jörg Kliewer
TIT
2011
121views more  TIT 2011»
13 years 3 months ago
Strongly Consistent Estimation of the Sample Distribution of Noisy Continuous-Parameter Fields
The general problem of defining and determining the sample distribution in the case of continuousparameter random fields, is addressed. Defining a distribution in the case of d...
Shahar Z. Kovalsky, Guy Cohen, Joseph M. Francos
JMLR
2010
198views more  JMLR 2010»
13 years 3 months ago
Online Anomaly Detection under Adversarial Impact
Security analysis of learning algorithms is gaining increasing importance, especially since they have become target of deliberate obstruction in certain applications. Some securit...
Marius Kloft, Pavel Laskov