Sciweavers

2211 search results - page 78 / 443
» Robustness of Model-Based Simulations
Sort
View
ESA
2008
Springer
129views Algorithms» more  ESA 2008»
13 years 11 months ago
More Robust Hashing: Cuckoo Hashing with a Stash
Cuckoo hashing holds great potential as a high-performance hashing scheme for real applications. Up to this point, the greatest drawback of cuckoo hashing appears to be that there...
Adam Kirsch, Michael Mitzenmacher, Udi Wieder
ICASSP
2010
IEEE
13 years 10 months ago
Robust critical data recovery for MPEG-4 AAC encoded bitstreams
This paper presents a bandwidth-efficient method for improved decoding of critical data generated by the MPEG-4 AAC audio coder when encoded bitstreams are transmitted over noisy...
Ruijing Hu, Xucen Huang, Michel Kieffer, Olivier D...
CONCURRENCY
2008
80views more  CONCURRENCY 2008»
13 years 10 months ago
Robust incentives via multi-level Tit-for-Tat
Much work has been done to address the need for incentive models in real deployed peer-to-peer networks. In this paper, we discuss problems found with the incentive model in a lar...
Qiao Lian, Yu Peng, Mao Yang, Zheng Zhang, Yafei D...
TSMC
1998
117views more  TSMC 1998»
13 years 9 months ago
A mean field annealing approach to robust corner detection
—This paper is an extension of our previous paper to improve the capability of detecting corners. We proposed a method of boundary smoothing for curvature estimation using a cons...
Kwanghoon Sohn, Jung H. Kim, Winser E. Alexander
CDC
2010
IEEE
13 years 5 months ago
A Switching strategy for robust cooperative exploration
Abstract-- This paper develops a switching strategy for networked mobile sensing agents to automatically decide when to perform individual exploration and when to perform cooperati...
Wencen Wu, Fumin Zhang