Sciweavers

2315 search results - page 66 / 463
» Does EigenPalm work
Sort
View
CORR
2012
Springer
192views Education» more  CORR 2012»
12 years 5 months ago
The best of both worlds: stochastic and adversarial bandits
We present a bandit algorithm, SAO (Stochastic and Adversarial Optimal), whose regret is, essentially, optimal both for adversarial rewards and for stochastic rewards. Specifical...
Sébastien Bubeck, Aleksandrs Slivkins
ICIAP
2007
ACM
14 years 10 months ago
Alignment of videos recorded from moving vehicles
We address the synchronization of a pair of video sequences captured from moving vehicles and the spatial registration of all the temporally corresponding frames. This is necessar...
Felipe Lumbreras, Ferran Diego, Joan Serrat, Jos&e...
ICC
2007
IEEE
113views Communications» more  ICC 2007»
14 years 4 months ago
Detection of Masquerade Attacks on Wireless Sensor Networks
— We propose two lightweight techniques to detect masquerade attacks on wireless sensor networks (WSN). Our solutions take into consideration, important WSN properties like cover...
Vijay Bhuse, Ajay K. Gupta, Ala I. Al-Fuqaha
SPIN
2004
Springer
14 years 3 months ago
Minimization of Counterexamples in SPIN
We propose an algorithm to find a counterexample to some property in a finite state program. This algorithm is derived from SPIN’s one, but it finds a counterexample faster th...
Paul Gastin, Pierre Moro, Marc Zeitoun
DCOSS
2008
Springer
13 years 12 months ago
SAKE: Software Attestation for Key Establishment in Sensor Networks
Abstract. This paper presents a protocol called SAKE (Software Attestation for Key Establishment), for establishing a shared key between any two neighboring nodes of a sensor netwo...
Arvind Seshadri, Mark Luk, Adrian Perrig