Sciweavers

574 search results - page 22 / 115
» Robust Factorization
Sort
View
TWC
2008
145views more  TWC 2008»
13 years 9 months ago
Robust Optimization Models for Energy-Limited Wireless Sensor Networks under Distance Uncertainty
The distance between nodes in a wireless sensor network (WSN) is an important factor in the performance that can be extracted from the network for many tasks. However, the distanc...
Wei Ye, Fernando Ordóñez
JEI
2006
113views more  JEI 2006»
13 years 9 months ago
Transparent robust information hiding for ownership verification
For copyright protection, the robustness of a watermarking scheme against various attacks is an essential requirement. Many proposed robust watermarking schemes may achieve good r...
Dan Yu, Farook Sattar, Sirajudeen Gulam Razul
SODA
2010
ACM
208views Algorithms» more  SODA 2010»
14 years 7 months ago
Correlation Robust Stochastic Optimization
We consider a robust model proposed by Scarf, 1958, for stochastic optimization when only the marginal probabilities of (binary) random variables are given, and the correlation be...
Shipra Agrawal, Yichuan Ding, Amin Saberi, Yinyu Y...
FTCS
1998
144views more  FTCS 1998»
13 years 11 months ago
Improving Software Robustness with Dependability Cases
Programs fail mainly for two reasons: logic errors in the code, and exception failures. Exception failures can account for up to 2/3 of system crashes [6], hence are worthy of ser...
Roy A. Maxion, Robert T. Olszewski
ICIP
2007
IEEE
14 years 11 months ago
Robust Hash for Detecting and Localizing Image Tampering
An image hash should be (1) robust to allowable operations and (2) sensitive to illegal manipulations (like image tampering) and distinct queries. Although existing methods try to...
Sujoy Roy, Qibin Sun