Sciweavers

5302 search results - page 224 / 1061
» Learning How to Separate
Sort
View
146
Voted
TIT
2008
99views more  TIT 2008»
15 years 4 months ago
On the Connection-Level Stability of Congestion-Controlled Communication Networks
We are interested in the connection-level stability of a network employing congestion control. In particular, we study how the stability region of the network (i.e., the set of off...
Xiaojun Lin, Ness B. Shroff, R. Srikant
138
Voted
SAC
2002
ACM
15 years 4 months ago
Proxy-based security protocols in networked mobile devices
We describe a resource discovery and communication system designed for security and privacy. All objects in the system, e.g., appliances, wearable gadgets, software agents, and us...
Matt Burnside, Dwaine E. Clarke, Todd Mills, Andre...
153
Voted
JMIV
2010
98views more  JMIV 2010»
15 years 3 months ago
Expectations of Random Sets and Their Boundaries Using Oriented Distance Functions
Shape estimation and object reconstruction are common problems in image analysis. Mathematically, viewing objects in the image plane as random sets reduces the problem of shape es...
Hanna K. Jankowski, Larissa I. Stanberry
ICA
2012
Springer
14 years 16 days ago
Distributional Convergence of Subspace Estimates in FastICA: A Bootstrap Study
Independent component analysis (ICA) is possibly the most widespread approach to solve the blind source separation (BSS) problem. Many different algorithms have been proposed, tog...
Jarkko Ylipaavalniemi, Nima Reyhani, Ricardo Vig&a...
115
Voted
ESANN
2008
15 years 6 months ago
Methodology and standards for data analysis with machine learning tools
Many tools for data mining are complex and require skills and experience to be used successfully. Therefore, data mining is often considered an art as much as science. This paper p...
Damien François