Sciweavers

2287 search results - page 387 / 458
» Making it Real
Sort
View
116
Voted
ICASSP
2008
IEEE
15 years 9 months ago
An information theoretic approach to processing management
In region surveillance applications, sensors oftentimes accumulate an overwhelmingly large amount of data, making it infeasible to process all of the collected data in real-time. ...
Christopher M. Kreucher, Kevin M. Carter
ICDM
2008
IEEE
97views Data Mining» more  ICDM 2008»
15 years 9 months ago
Semi-supervised Learning from General Unlabeled Data
We consider the problem of Semi-supervised Learning (SSL) from general unlabeled data, which may contain irrelevant samples. Within the binary setting, our model manages to better...
Kaizhu Huang, Zenglin Xu, Irwin King, Michael R. L...
ICRA
2008
IEEE
155views Robotics» more  ICRA 2008»
15 years 9 months ago
Differential elastic actuator for robotic interaction tasks
For complex robotic tasks (manipulation, locomotion, haptics, ...), the lack of knowledge of precise interaction models, the difficulties to precisely measure the task associated ...
Michel Lauria, Marc-Antoine Legault, Marc-Andr&eac...
INFOCOM
2008
IEEE
15 years 9 months ago
Stable Peers: Existence, Importance, and Application in Peer-to-Peer Live Video Streaming
—This paper presents a systematic in-depth study on the existence, importance, and application of stable nodes in peerto-peer live video streaming. Using traces from a real large...
Feng Wang, Jiangchuan Liu, Yongqiang Xiong
INFOCOM
2008
IEEE
15 years 9 months ago
Live Baiting for Service-Level DoS Attackers
Abstract. Denial-of-Service (DoS) attacks remain a challenging problem in the Internet. In a DoS attack the attacker is attempting to make a resource unavailable to its intended le...
Sherif M. Khattab, Sameh Gobriel, Rami G. Melhem, ...