Sciweavers

1640 search results - page 318 / 328
» Deriving Private Information from Randomized Data
Sort
View
TSP
2010
13 years 3 months ago
Bayesian multi-object filtering with amplitude feature likelihood for unknown object SNR
In many tracking scenarios, the amplitude of target returns are stronger than those coming from false alarms. This information can be used to improve the multi-target state estimat...
Daniel Clark, Branko Ristic, Ba-Ngu Vo, Ba-Tuong V...
TMA
2010
Springer
166views Management» more  TMA 2010»
14 years 3 months ago
Understanding and Preparing for DNS Evolution
The Domain Name System (DNS) is a crucial component of today’s Internet. The top layer of the DNS hierarchy (the root nameservers) is facing dramatic changes: cryptographically s...
Sebastian Castro, Min Zhang, Wolfgang John, Duane ...
INFOCOM
2009
IEEE
14 years 3 months ago
Distributed Opportunistic Scheduling With Two-Level Channel Probing
Distributed opportunistic scheduling (DOS) is studied for wireless ad-hoc networks in which many links contend for the channel using random access before data transmissions. Simpl...
P. S. Chandrashekhar Thejaswi, Junshan Zhang, Man-...
ICPP
2007
IEEE
14 years 2 months ago
Improving Search Using a Fault-Tolerant Overlay in Unstructured P2P Systems
Gnutella overlays have evolved to use a two-tier topology. However, we observed that the new topology had only achieved modest improvements in search success rates. Also, the new ...
William Acosta, Surendar Chandra
ML
2008
ACM
248views Machine Learning» more  ML 2008»
13 years 8 months ago
Feature selection via sensitivity analysis of SVM probabilistic outputs
Feature selection is an important aspect of solving data-mining and machine-learning problems. This paper proposes a feature-selection method for the Support Vector Machine (SVM) l...
Kai Quan Shen, Chong Jin Ong, Xiao Ping Li, Einar ...