Sciweavers

7200 search results - page 1438 / 1440
» On the Computational Power of Winner-Take-All
Sort
View
CORR
2011
Springer
143views Education» more  CORR 2011»
12 years 9 months ago
Non-malleable extractors via character sums
In studying how to communicate over a public channel with an active adversary, Dodis and Wichs introduced the notion of a non-malleable extractor. A non-malleable extractor dramat...
Trevor D. Wooley, David Zuckerman
ICASSP
2011
IEEE
12 years 9 months ago
A method to infer emotions from facial Action Units
We present a robust method to map detected facial Action Units (AUs) to six basic emotions. Automatic AU recognition is prone to errors due to illumination, tracking failures and ...
Sudha Velusamy, Hariprasad Kannan, Balasubramanian...
ICDE
2011
IEEE
244views Database» more  ICDE 2011»
12 years 9 months ago
Algorithms for local sensor synchronization
— In a wireless sensor network (WSN), each sensor monitors environmental parameters, and reports its readings to a base station, possibly through other nodes. A sensor works in c...
Lixing Wang, Yin Yang, Xin Miao, Dimitris Papadias...
TKDE
2011
266views more  TKDE 2011»
12 years 9 months ago
Continuous Monitoring of Distance Based Range Queries
Given a positive value r, a distance based range query returns the objects that lie within the distance r of the query location. In this paper, we focus on the distance based rang...
Muhammad Aamir Cheema, Ljiljana Brankovic, Xuemin ...
SASN
2004
ACM
13 years 11 months ago
Securing quality-of-service route discovery in on-demand routing for ad hoc networks
An ad hoc network is a collection of computers (nodes) that cooperate to forward packets for each other over a multihop wireless network. Users of such networks may wish to use de...
Yih-Chun Hu, David B. Johnson
« Prev « First page 1438 / 1440 Last » Next »