Sciweavers

1702 search results - page 172 / 341
» Hidden Pattern Statistics
Sort
View
GLOBECOM
2008
IEEE
15 years 8 months ago
Performance Metric Sensitivity Computation for Optimization and Trade-Off Analysis in Wireless Networks
Abstract—We develop and evaluate a new method for estimating and optimizing various performance metrics for multihop wireless networks, including MANETs. We introduce an approxim...
John S. Baras, Vahid Tabatabaee, George Papageorgi...
114
Voted
ICASSP
2008
IEEE
15 years 8 months ago
A constrained coefficient ica algorithm for group difference enhancement
Independent component analysis (ICA) is a statistical and computational technique for revealing hidden factors that underlie sets of signals. We propose an improved ICA framework ...
Jing Sui, Jingyu Liu, Lei Wu, Andrew Michael, Lai ...
107
Voted
ICRA
2008
IEEE
149views Robotics» more  ICRA 2008»
15 years 8 months ago
Information-optimal selective data return for autonomous rover traverse science and survey
— Selective data return leverages onboard data analysis to allocate limited bandwidth resources during remote exploration. Here we present an adaptive method to subsample image s...
David R. Thompson, Trey Smith, David Wettergreen
LCN
2008
IEEE
15 years 8 months ago
Covert channels in multiplayer first person shooter online games
Abstract—Covert channels aim to hide the existence of communication between two or more parties. Such channels typically utilise pre-existing (overt) data transmissions to carry ...
Sebastian Zander, Grenville J. Armitage, Philip Br...
FOCI
2007
IEEE
15 years 8 months ago
Almost All Learning Machines are Singular
— A learning machine is called singular if its Fisher information matrix is singular. Almost all learning machines used in information processing are singular, for example, layer...
Sumio Watanabe