Sciweavers

640 search results - page 5 / 128
» Topology Without Tears
Sort
View
HICSS
2012
IEEE
296views Biometrics» more  HICSS 2012»
12 years 3 months ago
Topology Perturbation for Detecting Malicious Data Injection
Bad measurement data exists in power systems for a number of reasons. Malicious data injection attacks, which alter the values of measurements without being detected, are one pote...
K. L. Morrow, Erich Heine, Katherine M. Rogers, Ra...
SENSYS
2003
ACM
14 years 25 days ago
GEM: graph eMbedding for routing and data-centric storage in sensor networks without geographic information
The widespread deployment of sensor networks is on the horizon. One of the main challenges in sensor networks is to process and aggregate data in the network rather than wasting e...
James Newsome, Dawn Xiaodong Song
ICASSP
2011
IEEE
12 years 11 months ago
Incremental-cooperative strategies in combination of adaptive filters
A new topology for combination of adaptive filters is proposed. Based on incremental strategies, the standard convexly combined parallel-independent filters are rearranged into ...
Wilder B. Lopes, Cassio G. Lopes
CVPR
2001
IEEE
14 years 9 months ago
Bending Invariant Representations for Surfaces
Isometric surfaces share the same geometric structure also known as the `first fundamental form'. For example, all possible bending of a given surface, that include all lengt...
Asi Elad (Elbaz), Ron Kimmel
3DOR
2008
13 years 10 months ago
Isometry-invariant Matching of Point Set Surfaces
Shape deformations preserving the intrinsic properties of a surface are called isometries. An isometry deforms a surface without tearing or stretching it, and preserves geodesic d...
Mauro R. Ruggeri, Dietmar Saupe