Sciweavers

12257 search results - page 2094 / 2452
» Analysis of Algorithms
Sort
View
FOCS
2008
IEEE
15 years 11 months ago
Noise Tolerance of Expanders and Sublinear Expander Reconstruction
We consider the problem of online sublinear expander reconstruction and its relation to random walks in “noisy” expanders. Given access to an adjacency list representation of ...
Satyen Kale, Yuval Peres, C. Seshadhri
128
Voted
GLOBECOM
2008
IEEE
15 years 11 months ago
TwoHop: Metric-Based Trust Evaluation for Peer-to-Peer Collaboration Environments
—Communications are increasingly relying on peer– to–peer models of interaction in which all participating entities have the same level of authority. Such models allow develo...
Dimitris Glynos, Patroklos G. Argyroudis, Christos...
120
Voted
HOST
2008
IEEE
15 years 11 months ago
Slicing Up a Perfect Hardware Masking Scheme
—Masking is a side-channel countermeasure that randomizes side-channel leakage, such as the power dissipation of a circuit. Masking is only effective on the condition that the in...
Zhimin Chen, Patrick Schaumont
147
Voted
ICASSP
2008
IEEE
15 years 11 months ago
A new mutual information measure for independent component alalysis
Independent component analysis (ICA) is a popular approach for blind source separation (BSS). In this study, we develop a new mutual information measure for BSS and unsupervised l...
Jen-Tzung Chien, Hsin-Lung Hsieh, Sadaoki Furui
ICASSP
2008
IEEE
15 years 11 months ago
Hierarchical lane detection for different types of roads
This paper presents a hierarchical lane detection system with the ability to deal with both structured and unstructured roads. The proposed system classifies the environment first...
Hsu-Yung Cheng, Chih-Chang Yu, Chien-Cheng Tseng, ...
« Prev « First page 2094 / 2452 Last » Next »