Sciweavers

3820 search results - page 602 / 764
» Bounded Model Debugging
Sort
View
SP
2010
IEEE
156views Security Privacy» more  SP 2010»
15 years 12 days ago
Round-Efficient Broadcast Authentication Protocols for Fixed Topology Classes
Abstract--We consider resource-constrained broadcast authentication for n receivers in a static, known network topology. There are only two known broadcast authentication protocols...
Haowen Chan, Adrian Perrig
132
Voted
JMLR
2011
148views more  JMLR 2011»
14 years 9 months ago
Multitask Sparsity via Maximum Entropy Discrimination
A multitask learning framework is developed for discriminative classification and regression where multiple large-margin linear classifiers are estimated for different predictio...
Tony Jebara
134
Voted
SIAMNUM
2011
154views more  SIAMNUM 2011»
14 years 9 months ago
Continuous Mesh Framework Part I: Well-Posed Continuous Interpolation Error
In the context of mesh adaptation, Riemannian metric spaces have been used to prescribe orientation, density and stretching of anisotropic meshes. But, such structures are only con...
Adrien Loseille, Frédéric Alauzet
CORR
2010
Springer
171views Education» more  CORR 2010»
14 years 9 months ago
Online Learning in Opportunistic Spectrum Access: A Restless Bandit Approach
We consider an opportunistic spectrum access (OSA) problem where the time-varying condition of each channel (e.g., as a result of random fading or certain primary users' activ...
Cem Tekin, Mingyan Liu
TIT
2010
137views Education» more  TIT 2010»
14 years 9 months ago
Average case analysis of multichannel sparse recovery using convex relaxation
This paper considers recovery of jointly sparse multichannel signals from incomplete measurements. Several approaches have been developed to recover the unknown sparse vectors from...
Yonina C. Eldar, Holger Rauhut