Sciweavers

897 search results - page 56 / 180
» Identity: How to name it, How to find it
Sort
View
CORR
2010
Springer
127views Education» more  CORR 2010»
13 years 8 months ago
Analysis of Basis Pursuit Via Capacity Sets
Finding the sparsest solution for an under-determined linear system of equations D = s is of interest in many applications. This problem is known to be NP-hard. Recent work studie...
Joseph Shtok, Michael Elad
CEC
2007
IEEE
14 years 3 months ago
A biologically inspired approach for the control of the hand
The control of the hand in primate species is characterized by a high dimensionality, due to the large number of joints in the fingers. In this study we present how its manipulatio...
Emmanouil Hourdakis, Michail Maniadakis, Panos E. ...
ITS
2010
Springer
132views Multimedia» more  ITS 2010»
14 years 17 days ago
Comparing Disengaged Behavior within a Cognitive Tutor in the USA and Philippines
We study how student behaviors associated with engagement differ across different school settings. We present a study to investigate the variation in gaming the system and off-task...
Ma. Mercedes T. Rodrigo, Ryan Shaun Joazeiro de Ba...
DCC
2010
IEEE
14 years 3 months ago
On the Systematic Measurement Matrix for Compressed Sensing in the Presence of Gross Errors
Inspired by syndrome source coding using linear error-correcting codes, we explore a new form of measurement matrix for compressed sensing. The proposed matrix is constructed in t...
Zhi Li, Feng Wu, John Wright
CSFW
2002
IEEE
14 years 1 months ago
Capturing Parallel Attacks within the Data Independence Framework
We carry forward the work described in our previous papers [3, 14, 12] on the application of data independence to the model checking of cryptographic protocols using CSP [13] and ...
Philippa J. Broadfoot, A. W. Roscoe