Sciweavers

4679 search results - page 855 / 936
» Modeling When Connections Are the Problem
Sort
View
CGF
2011
14 years 1 months ago
Contouring Discrete Indicator Functions
We present a method for calculating the boundary of objects from Discrete Indicator Functions that store 2material volume fractions with a high degree of accuracy. Although Marchi...
Josiah Manson, J. Smith, Scott Schaefer
INFOCOM
2011
IEEE
14 years 1 months ago
Maintaining source privacy under eavesdropping and node compromise attacks
—In a sensor network, an important problem is to provide privacy to the event detecting sensor node and integrity to the data gathered by the node. Compromised source privacy can...
Kanthakumar Pongaliur, Li Xiao
CRV
2011
IEEE
340views Robotics» more  CRV 2011»
13 years 9 months ago
Combining Multi-robot Exploration and Rendezvous
—We consider the problem of exploring an unknown environment with a pair of mobile robots. The goal is to make the robots meet (or rendezvous) in minimum time such that there is ...
Malika Meghjani, Gregory Dudek
CORR
2012
Springer
272views Education» more  CORR 2012»
13 years 5 months ago
Fast and Exact Top-k Search for Random Walk with Restart
Graphs are fundamental data structures and have been employed for centuries to model real-world systems and phenomena. Random walk with restart (RWR) provides a good proximity sco...
Yasuhiro Fujiwara, Makoto Nakatsuji, Makoto Onizuk...
ICA
2012
Springer
13 years 5 months ago
Multi-domain Feature of Event-Related Potential Extracted by Nonnegative Tensor Factorization: 5 vs 14 Electrodes EEG Data
As nonnegative tensor factorization (NTF) is particularly useful for the problem of underdetermined linear transform model, we performed NTF on the EEG data recorded from 14 electr...
Fengyu Cong, Anh Huy Phan, Piia Astikainen, Qibin ...