Sciweavers

2131 search results - page 423 / 427
» Immunity for Closed Sets
Sort
View
CORR
2011
Springer
206views Education» more  CORR 2011»
13 years 9 days ago
Modeling and Analysis of K-Tier Downlink Heterogeneous Cellular Networks
Cellular networks are in a major transition from a carefully planned set of large tower-mounted basestations (BSs) to an irregular deployment of heterogeneous infrastructure eleme...
Harpreet S. Dhillon, Radha Krishna Ganti, Fran&cce...
ICASSP
2011
IEEE
13 years 8 days ago
A method to infer emotions from facial Action Units
We present a robust method to map detected facial Action Units (AUs) to six basic emotions. Automatic AU recognition is prone to errors due to illumination, tracking failures and ...
Sudha Velusamy, Hariprasad Kannan, Balasubramanian...
ICASSP
2011
IEEE
13 years 8 days ago
A knapsack problem formulation for relay selection in secure cooperative wireless communication
—Cooperative jamming (CJ) schemes support secure wireless communication in the presence of one or more eavesdroppers. Larger numbers of cooperative relays provide better secrecy ...
Shuangyu Luo, Hana Godrich, Athina P. Petropulu, H...
INFOCOM
2011
IEEE
13 years 7 days ago
Privacy analysis of user association logs in a large-scale wireless LAN
User association logs collected from a large-scale wireless LAN record where and when a user has used the network. Such information plays an important role in wireless network res...
Keren Tan, Guanhua Yan, Jihwang Yeo, David Kotz
BMCBI
2011
13 years 4 days ago
MINE: Module Identification in NEtworks
Background: Graphical models of network associations are useful for both visualizing and integrating multiple types of association data. Identifying modules, or groups of function...
Kahn Rhrissorrakrai, Kristin C. Gunsalus