Sciweavers

688 search results - page 58 / 138
» Extracting the abstraction pyramid from complex networks
Sort
View
CANS
2007
Springer
150views Cryptology» more  CANS 2007»
15 years 4 months ago
Perfectly Secure Message Transmission in Directed Networks Tolerating Threshold and Non Threshold Adversary
Abstract. In this paper we study Perfectly Secure Message Transmission (PSMT) between a sender S and a receiver R, connected in a directed synchronous network through multiple para...
Arpita Patra, Bhavani Shankar, Ashish Choudhary, K...
CDC
2009
IEEE
132views Control Systems» more  CDC 2009»
15 years 2 months ago
Robust stability of multi-hop control networks
Abstract— We propose formal models for analyzing robustness of multi-hop control networks, where data from sensors to controllers and from controllers to actuators is sent throug...
Gera Weiss, Alessandro D'Innocenzo, Rajeev Alur, K...
TNN
2008
119views more  TNN 2008»
14 years 9 months ago
Selecting Useful Groups of Features in a Connectionist Framework
Abstract--Suppose for a given classification or function approximation (FA) problem data are collected using sensors. From the output of the th sensor, features are extracted, ther...
Debrup Chakraborty, Nikhil R. Pal
ICANN
2010
Springer
14 years 8 months ago
Shape-Based Tumor Retrieval in Mammograms Using Relevance-Feedback Techniques
Abstract. This paper presents an experimental "morphological analysis" retrieval system for mammograms, using Relevance-Feedback techniques. The features adopted are firs...
Stylianos D. Tzikopoulos, Harris V. Georgiou, Mich...
NIPS
2008
14 years 11 months ago
Partially Observed Maximum Entropy Discrimination Markov Networks
Learning graphical models with hidden variables can offer semantic insights to complex data and lead to salient structured predictors without relying on expensive, sometime unatta...
Jun Zhu, Eric P. Xing, Bo Zhang