Sciweavers

525 search results - page 49 / 105
» Threshold Schemes with Disenrollment
Sort
View
ICC
2007
IEEE
118views Communications» more  ICC 2007»
14 years 4 months ago
Sending Correlated Gaussian Sources over a Gaussian MAC: To Code, or not to Code
— We consider 1-helper problem in which one source provides partial side information to the fusion center (FC) to help reconstruction of the main source signal. Both sources comm...
Hamid Behroozi, M. Reza Soleymani
ICDM
2006
IEEE
226views Data Mining» more  ICDM 2006»
14 years 4 months ago
Converting Output Scores from Outlier Detection Algorithms into Probability Estimates
Current outlier detection schemes typically output a numeric score representing the degree to which a given observation is an outlier. We argue that converting the scores into wel...
Jing Gao, Pang-Ning Tan
NDSS
2003
IEEE
14 years 3 months ago
Proxy Cryptography Revisited
In this work we revisit and formally study the notion of proxy cryptography. Intuitively, various proxy functions allow two cooperating parties F (the “FBI”) and P (the “pro...
Anca-Andreea Ivan, Yevgeniy Dodis
TMC
2010
151views more  TMC 2010»
13 years 8 months ago
Access Strategies for Spectrum Sharing in Fading Environment: Overlay, Underlay, and Mixed
—In this paper, we analyze the achievable capacity of the secondary service for overlay and underlay access strategies. We then propose a novel mixed access strategy in which in ...
Mohammad G. Khoshkholgh, Keivan Navaie, Halim Yani...
ICASSP
2010
IEEE
13 years 8 months ago
A distributed psycho-visually motivated Canny edge detector
This paper proposes a distributed Canny edge detection algorithm which can be mapped onto multi-core architectures for high throughput applications. In contrast to the conventiona...
Srenivas Varadarajan, Chaitali Chakrabarti, Lina J...