Sciweavers

415 search results - page 51 / 83
» Propagating functional dependencies with conditions
Sort
View
TIT
2008
133views more  TIT 2008»
13 years 8 months ago
On the Uniqueness of Nonnegative Sparse Solutions to Underdetermined Systems of Equations
An underdetermined linear system of equations Ax = b with non-negativity constraint x 0 is considered. It is shown that for matrices A with a row-span intersecting the positive o...
Alfred M. Bruckstein, Michael Elad, Michael Zibule...
JNW
2007
140views more  JNW 2007»
13 years 8 months ago
The Effect of Physical Topology on Wireless Sensor Network Lifetime
— Wireless sensor networks must measure environmental conditions, such as temperature, over extended periods and therefore require a long system lifetime. The design of long life...
Debdhanit Yupho, Joseph Kabara
CSIE
2009
IEEE
14 years 3 months ago
Discriminative Random Fields for Behavior Modeling
This paper proposed an approach of human behavior modeling based on Discriminative Random Fields. In this model, by introducing the hidden behavior feature functions and time wind...
Tianyu Huang, Chongde Shi, Fengxia Li
PSIVT
2009
Springer
184views Multimedia» more  PSIVT 2009»
14 years 3 months ago
Detecting Video Forgeries Based on Noise Characteristics
The recent development of video editing techniques enables us to create realistic synthesized videos. Therefore using video data as evidence in places such as a court of law requir...
Michihiro Kobayashi, Takahiro Okabe, Yoichi Sato
RTA
2007
Springer
14 years 2 months ago
Intruders with Caps
In the analysis of cryptographic protocols, a treacherous set of terms is one from which an intruder can get access to what was intended to be secret, by adding on to the top of a ...
Siva Anantharaman, Paliath Narendran, Michaël...