Sciweavers

4052 search results - page 292 / 811
» Comparing Networks from a Data Analysis Perspective
Sort
View
SAC
2008
ACM
15 years 4 months ago
Privacy-preserving link discovery
Abstract. Link discovery is a process of identifying association(s) among different entities included in a complex network structure. These association(s) may represent any interac...
Xiaoyun He, Basit Shafiq, Jaideep Vaidya, Nabil R....
CORR
2010
Springer
133views Education» more  CORR 2010»
15 years 4 months ago
PSIM: A tool for analysis of device pairing methods
Wireless networks are a common place nowadays and almost all of the modern devices support wireless communication in some form. These networks differ from more traditional computi...
Yasir Arfat Malkani, Lachhman Das Dhomeja
ICASSP
2010
IEEE
15 years 4 months ago
Training a support vector machine to classify signals in a real environment given clean training data
When building a classifier from clean training data for a particular test environment, knowledge about the environmental noise and channel should be taken into account. We propos...
Kevin Jamieson, Maya R. Gupta, Eric Swanson, Hyrum...
CSDA
2010
157views more  CSDA 2010»
15 years 4 months ago
Robust estimation of constrained covariance matrices for confirmatory factor analysis
Confirmatory factor analysis (CFA) is a data anylsis procedure that is widely used in social and behavioral sciences in general and other applied sciences that deal with large qua...
E. Dupuis Lozeron, M. P. Victoria-Feser
TON
2010
152views more  TON 2010»
15 years 2 months ago
1 + N network protection for mesh networks: network coding-based protection using p-cycles
—p-Cycles have been proposed for preprovisioned 1 : N protection in optical mesh networks. Although the protection circuits are preconfigured, the detection of failures and the ...
Ahmed E. Kamal