Sciweavers

1634 search results - page 168 / 327
» Classifying Technical Terms
Sort
View
CCR
2010
133views more  CCR 2010»
13 years 10 months ago
The role of network trace anonymization under attack
In recent years, academic literature has analyzed many attacks on network trace anonymization techniques. These attacks usually correlate external information with anonymized data...
Martin Burkhart, Dominik Schatzmann, Brian Trammel...
CORR
2010
Springer
159views Education» more  CORR 2010»
13 years 10 months ago
An Alternative Proof for the Capacity Region of the Degraded Gaussian MIMO Broadcast Channel
We provide an alternative proof for the capacity region of the degraded Gaussian multiple-input multiple-output (MIMO) broadcast channel. Our proof does not use the channel enhanc...
Ersen Ekrem, Sennur Ulukus
CORR
2010
Springer
168views Education» more  CORR 2010»
13 years 10 months ago
A Bayesian Review of the Poisson-Dirichlet Process
The two parameter Poisson-Dirichlet process is also known as the PitmanYor Process and related to the Chinese Restaurant Process, is a generalisation of the Dirichlet Process, and...
Wray L. Buntine, Marcus Hutter
DCG
2008
104views more  DCG 2008»
13 years 10 months ago
Finding the Homology of Submanifolds with High Confidence from Random Samples
Recently there has been a lot of interest in geometrically motivated approaches to data analysis in high dimensional spaces. We consider the case where data is drawn from sampling...
Partha Niyogi, Stephen Smale, Shmuel Weinberger
CORR
2007
Springer
82views Education» more  CORR 2007»
13 years 10 months ago
One-bit Distributed Sensing and Coding for Field Estimation in Sensor Networks
Abstract—This paper formulates and studies a general distributed field reconstruction problem using a dense network of noisy one-bit randomized scalar quantizers in the presence...
Ye Wang, Prakash Ishwar, Venkatesh Saligrama