Sciweavers

3690 search results - page 613 / 738
» Computation with classical sequents
Sort
View
CISS
2010
IEEE
14 years 1 months ago
Limiting false data attacks on power system state estimation
Abstract-Malicious attacks against power system state estimation are considered. It has been recently observed that if an adversary is able to manipulate the measurements taken at ...
Oliver Kosut, Liyan Jia, Robert J. Thomas, Lang To...
CVIU
2011
14 years 1 months ago
Graph attribute embedding via Riemannian submersion learning
In this paper, we tackle the problem of embedding a set of relational structures into a metric space for purposes of matching and categorisation. To this end, we view the problem ...
Haifeng Zhao, Antonio Robles-Kelly, Jun Zhou, Jian...
IUI
2011
ACM
14 years 27 days ago
Protractor3D: a closed-form solution to rotation-invariant 3D gestures
Protractor 3D is a gesture recognizer that extends the 2D touch screen gesture recognizer Protractor [8] to 3D gestures. It inherits many of Protractor’s desirable properties, s...
Sven G. Kratz, Michael Rohs
MSOM
2011
14 years 25 days ago
Volume Flexibility, Product Flexibility, or Both: The Role of Demand Correlation and Product Substitution
We analyze volume flexibility — the ability to produce above/below the installed capacity for a product — under endogenous pricing in a two-product setting. We discover that ...
Manu Goyal, Serguei Netessine
SDM
2011
SIAM
230views Data Mining» more  SDM 2011»
14 years 24 days ago
Multidimensional Association Rules in Boolean Tensors
Popular data mining methods support knowledge discovery from patterns that hold in binary relations. We study the generalization of association rule mining within arbitrary n-ary ...
Kim-Ngan Nguyen, Loïc Cerf, Marc Plantevit, J...