Sciweavers

97 search results - page 14 / 20
» Ink-Bleed Reduction using Functional Minimization
Sort
View
TMC
2008
90views more  TMC 2008»
13 years 7 months ago
Trust-Based Fast Authentication for Multiowner Wireless Networks
In multiowner wireless networks, access points (APs) are owned and operated by different administrations, leading to significant authentication delays during handoff between APs. W...
Jahan Hassan, Harsha Sirisena, Björn Landfeld...
CVPR
2008
IEEE
14 years 9 months ago
Robust tensor factorization using R1 norm
Over the years, many tensor based algorithms, e.g. two dimensional principle component analysis (2DPCA), two dimensional singular value decomposition (2DSVD), high order SVD, have...
Heng Huang, Chris H. Q. Ding
IJES
2006
110views more  IJES 2006»
13 years 7 months ago
Partitioning bin-packing algorithms for distributed real-time systems
Embedded real-time systems must satisfy not only logical functional requirements but also para-functional properties such as timeliness, Quality of Service (QoS) and reliability. W...
Dionisio de Niz, Raj Rajkumar
TSP
2010
13 years 2 months ago
Welch method revisited: nonparametric power spectrum estimation via circular overlap
The objective of this paper is twofold. The first part provides further insight in the statistical properties of the Welch power spectrum estimator. A major drawback of the Welch m...
Kurt Barbé, Rik Pintelon, Johan Schoukens
NIPS
2004
13 years 9 months ago
Reducing Spike Train Variability: A Computational Theory Of Spike-Timing Dependent Plasticity
Experimental studies have observed synaptic potentiation when a presynaptic neuron fires shortly before a postsynaptic neuron, and synaptic depression when the presynaptic neuron ...
Sander M. Bohte, Michael C. Mozer