Sciweavers

47 search results - page 5 / 10
» Relations between random coding exponents and the statistica...
Sort
View
IJSN
2007
73views more  IJSN 2007»
13 years 7 months ago
Optimal worm-scanning method using vulnerable-host distributions
: Most Internet worms use random scanning. The distribution of vulnerable hosts on the Internet, however, is highly non-uniform over the IP-address space. This implies that random ...
Zesheng Chen, Chuanyi Ji
ICASSP
2010
IEEE
13 years 7 months ago
Motion estimation from compressed linear measurements
This paper presents a novel algorithm for computing the relative motion between images from compressed linear measurements. We propose a geometry based correlation model that desc...
Vijayaraghavan Thirumalai, Pascal Frossard
NIPS
2008
13 years 9 months ago
Characterizing neural dependencies with copula models
The coding of information by neural populations depends critically on the statistical dependencies between neuronal responses. However, there is no simple model that can simultane...
Pietro Berkes, Frank Wood, Jonathan Pillow
ICDE
2010
IEEE
224views Database» more  ICDE 2010»
14 years 7 months ago
Probabilistic Declarative Information Extraction
Abstract-Unstructured text represents a large fraction of the world's data. It often contain snippets of structured information within them (e.g., people's names and zip ...
Daisy Zhe Wang, Eirinaios Michelakis, Joseph M. He...
TIT
2002
63views more  TIT 2002»
13 years 7 months ago
Structured unitary space-time autocoding constellations
We recently showed that arbitrarily reliable communication is possible within a single coherence interval in Rayleigh flat fading as the symbol-duration of the coherence interval ...
Thomas L. Marzetta, Babak Hassibi, Bertrand M. Hoc...