Sciweavers

174 search results - page 25 / 35
» Comparing Real Algebraic Numbers of Small Degree
Sort
View
CORR
2010
Springer
184views Education» more  CORR 2010»
13 years 7 months ago
Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay
We consider a Gaussian two-hop network where the source and the destination can communicate only via a relay node who is both an eavesdropper and a Byzantine adversary. Both the s...
Xiang He, Aylin Yener
BMCBI
2007
123views more  BMCBI 2007»
13 years 7 months ago
Robust clustering in high dimensional data using statistical depths
Background: Mean-based clustering algorithms such as bisecting k-means generally lack robustness. Although componentwise median is a more robust alternative, it can be a poor cent...
Yuanyuan Ding, Xin Dang, Hanxiang Peng, Dawn Wilki...
VIS
2008
IEEE
214views Visualization» more  VIS 2008»
14 years 8 months ago
Estimating Crossing Fibers: A Tensor Decomposition Approach
Diffusion weighted magnetic resonance imaging is a unique tool for non-invasive investigation of major nerve fiber tracts. Since the popular diffusion tensor (DT-MRI) model is limi...
Thomas Schultz, Hans-Peter Seidel
KDD
2009
ACM
182views Data Mining» more  KDD 2009»
14 years 8 months ago
Scalable graph clustering using stochastic flows: applications to community discovery
Algorithms based on simulating stochastic flows are a simple and natural solution for the problem of clustering graphs, but their widespread use has been hampered by their lack of...
Venu Satuluri, Srinivasan Parthasarathy
IROS
2006
IEEE
168views Robotics» more  IROS 2006»
14 years 1 months ago
Learning to Drive Among Obstacles
— This paper reports on an outdoor mobile robot that learns to avoid collisions by observing a human driver operate a vehicle equipped with sensors that continuously produce a ma...
Bradley Hamner, Sebastian Scherer, Sanjiv Singh