Sciweavers

CORR
2011
Springer
179views Education» more  CORR 2011»
13 years 6 months ago
Recovery of Sparsely Corrupted Signals
We investigate the recovery of signals exhibiting a sparse representation in a general (i.e., possibly redundant or incomplete) dictionary that are corrupted by additive noise adm...
Christoph Studer, Patrick Kuppinger, Graeme Pope, ...
CORR
2011
Springer
127views Education» more  CORR 2011»
13 years 6 months ago
Robust Distributed Routing in Dynamical Flow Networks
Giacomo Como, Ketan Savla, Daron Acemoglu, Munther...
CORR
2011
Springer
155views Education» more  CORR 2011»
13 years 6 months ago
Reconciling Compressive Sampling Systems for Spectrally-sparse Continuous-time Signals
The Random Demodulator (RD) and the Modulated Wideband Converter (MWC) are two recently proposed compressed sensing (CS) techniques for the acquisition of continuous-time spectral...
Michael A. Lexa, Mike E. Davies, John S. Thompson
CORR
2011
Springer
126views Education» more  CORR 2011»
13 years 6 months ago
Ensuring Correctness at the Application Level: a Software Framework Approach
Eloisa Bentivegna, Gabrielle Allen, Oleg Korobkin,...
CORR
2011
Springer
239views Education» more  CORR 2011»
13 years 6 months ago
From Linked Data to Relevant Data -- Time is the Essence
The Semantic Web initiative puts emphasis not primarily on putting data on the Web, but rather on creating links in a way that both humans and machines can explore the Web of data...
Markus Kirchberg, Ryan K. L. Ko, Bu Sung Lee
TII
2011
206views Education» more  TII 2011»
13 years 6 months ago
Timing-Failure Risk Assessment of UML Design Using Time Petri Net Bound Techniques
Abstract—Software systems that do not meet their timing constraints can cause risks. In this work, we propose a comprehensive method for assessing the risk of timing failure by e...
Simona Bernardi, Javier Campos, José Merseg...
TIFS
2011
375views Education» more  TIFS 2011»
13 years 6 months ago
Towards Situational Awareness of Large-Scale Botnet Probing Events
Zhichun Li, Anup Goyal, Yan Chen, Vern Paxson
TIFS
2011
259views Education» more  TIFS 2011»
13 years 6 months ago
Periocular Biometrics in the Visible Spectrum
— Periocular biometric refers to the facial region in the immediate vicinity of the eye. Acquisition of the periocular biometric does not require high user cooperation and close ...
Unsang Park, Raghavender R. Jillela, Arun Ross, An...
TIFS
2011
252views Education» more  TIFS 2011»
13 years 6 months ago
Quality Assessment of Degraded Iris Images Acquired in the Visible Wavelength
—Data quality assessment is a key issue, in order to broad the applicability of iris biometrics to unconstrained imaging conditions. Previous research efforts sought to use visib...
Hugo Proença
TIFS
2011
252views Education» more  TIFS 2011»
13 years 6 months ago
Secure Device Pairing Based on a Visual Channel: Design and Usability Study
— “Pairing” is the establishment of authenticated key agreement between two devices over a wireless channel. Such devices are ad hoc in nature as they lack any common preshar...
Nitesh Saxena, Jan-Erik Ekberg, Kari Kostiainen, N...