Sciweavers

ICASSP
2010
IEEE
13 years 4 months ago
Guaranteed robust distributed estimation in a network of sensors
This paper proposes a guaranteed robust bounded-error distributed estimation algorithm. It may be employed to perform parameter estimation from data collected in a network of wire...
Jean-Benoist Leger, Michel Kieffer
ICASSP
2010
IEEE
13 years 4 months ago
Tracking encrypted VoIP calls via robust hashing of network flows
In this work we propose a Voice over IP (VoIP) call tracking scheme based on robust hashing of VoIP flows. In the proposed scheme the audio content of a possibly encrypted VoIP ...
Baris Coskun, Nasir D. Memon
NIPS
2008
13 years 5 months ago
Robust Regression and Lasso
We consider robust least-squares regression with feature-wise disturbance. We show that this formulation leads to tractable convex optimization problems, and we exhibit a particul...
Huan Xu, Constantine Caramanis, Shie Mannor
AIPS
2008
13 years 6 months ago
Generating Robust Schedules Subject to Resource and Duration Uncertainties
We consider the Resource-Constrained Project Scheduling Problem with minimal and maximal time lags under resource and duration uncertainties. To manage resource uncertainties, we ...
Na Fu, Hoong Chuin Lau, Fei Xiao
ISCAS
2002
IEEE
94views Hardware» more  ISCAS 2002»
13 years 9 months ago
A robust self-resetting CMOS 32-bit parallel adder
This paper presents new circuit configurationsfor a more robust and efficient form of self-resettingCMOS (SRCMOS). Prior structures for SRCMOS have very high performance but are...
Gunok Jung, V. A. Sundarajan, Gerald E. Sobelman
ICCSA
2003
Springer
13 years 9 months ago
Efficient Speaker Identification Based on Robust VQ-PCA
Abstract. In this paper, an efficient speaker identification based on robust vector quantization principal component analysis (VQ-PCA) is proposed to solve the problems from outlie...
Younjeong Lee, Joohun Lee, Ki Yong Lee
SIGIR
2004
ACM
13 years 9 months ago
Retrieval evaluation with incomplete information
This paper examines whether the Cranfield evaluation methodology is robust to gross violations of the completeness assumption (i.e., the assumption that all relevant documents wi...
Chris Buckley, Ellen M. Voorhees
GFKL
2005
Springer
82views Data Mining» more  GFKL 2005»
13 years 10 months ago
Robust Multivariate Methods: The Projection Pursuit Approach
Projection pursuit was originally introduced to identify structures in multivariate data clouds (Huber, 1985). The idea of projecting data to a lowdimensional subspace can also be ...
Peter Filzmoser, Sven Serneels, Christophe Croux, ...
CSB
2005
IEEE
156views Bioinformatics» more  CSB 2005»
13 years 10 months ago
A Robust Meta-classification Strategy for Cancer Diagnosis from Gene Expression Data
One of the major challenges in cancer diagnosis from microarray data is to develop robust classification models which are independent of the analysis techniques used and can combi...
Gabriela Alexe, Gyan Bhanot, Babu Venkataraghavan,...
INFOCOM
2008
IEEE
13 years 10 months ago
Distributed Robust Optimization for Communication Networks
—Robustness of optimization models for networking problems has been an under-explored area. Yet most existing algorithms for solving robust optimization problems are centralized,...
Kai Yang, Yihong Wu, Jianwei Huang, Xiaodong Wang,...