Sciweavers

1460 search results - page 291 / 292
» Very Lightweight Requirements Modeling
Sort
View
CORR
2010
Springer
208views Education» more  CORR 2010»
13 years 4 months ago
Real-time Robust Principal Components' Pursuit
In the recent work of Candes et al, the problem of recovering low rank matrix corrupted by i.i.d. sparse outliers is studied and a very elegant solution, principal component pursui...
Chenlu Qiu, Namrata Vaswani
COMCOM
2011
13 years 2 months ago
Volume-aware positioning in the context of a marine port terminal
The rapid proliferation of mobile computing devices and local wireless networks over the past few years has promoted a continuously growing interest in location-aware systems and ...
Yesid Jarma, Golnaz Karbaschi, Marcelo Dias de Amo...
CORR
2011
Springer
169views Education» more  CORR 2011»
12 years 11 months ago
Pseudo-random graphs and bit probe schemes with one-sided error
We study probabilistic bit-probe schemes for the membership problem. Given a set A of at most n elements from the universe of size m we organize such a structure that queries of t...
Andrei E. Romashchenko
KDD
2012
ACM
271views Data Mining» more  KDD 2012»
11 years 10 months ago
GigaTensor: scaling tensor analysis up by 100 times - algorithms and discoveries
Many data are modeled as tensors, or multi dimensional arrays. Examples include the predicates (subject, verb, object) in knowledge bases, hyperlinks and anchor texts in the Web g...
U. Kang, Evangelos E. Papalexakis, Abhay Harpale, ...
ESORICS
2012
Springer
11 years 10 months ago
Secure Proximity Detection for NFC Devices Based on Ambient Sensor Data
In certain applications, it is important for a remote server to securely determine whether or not two mobile devices are in close physical proximity. In particular, in the context ...
Tzipora Halevi, Di Ma, Nitesh Saxena, Tuo Xiang