Sciweavers

2997 search results - page 409 / 600
» Fuzzy robustness analysis
Sort
View
INFOCOM
2010
IEEE
13 years 8 months ago
A Self-Organized Mechanism for Thwarting Malicious Access in Ad Hoc Networks
—This paper introduces a self-organized mechanism to control user access in ad hoc networks without requiring any infrastructure or a central administration entity. The proposed ...
Natalia Castro Fernandes, Marcelo D. D. Moreira, O...
MA
2010
Springer
86views Communications» more  MA 2010»
13 years 8 months ago
Tests for multiple regression based on simplicial depth
A general approach for developing distribution free tests for general linear models based on simplicial depth is applied to multiple regression. The tests are based on the asympto...
Robin Wellmann, Christine H. Müller
ICIP
2010
IEEE
13 years 8 months ago
Performance impact of ordinal ranking on content fingerprinting
Content fingerprinting provides a compact representation of multimedia objects for copy identification. This paper analyzes the impact of the ordinal-ranking based feature encodin...
Wei-Hong Chuang, Avinash L. Varna, Min Wu
ICML
2010
IEEE
13 years 8 months ago
Implicit Online Learning
Online learning algorithms have recently risen to prominence due to their strong theoretical guarantees and an increasing number of practical applications for large-scale data ana...
Brian Kulis, Peter L. Bartlett
ICPR
2010
IEEE
13 years 8 months ago
Learning Image Anchor Templates for Document Classification and Data Extraction
Image anchor templates are used in document image analysis for document classification, data localization, and other tasks. Current tools allow human operators to mark out small s...
Prateek Sarkar