Sciweavers

5754 search results - page 986 / 1151
» Multi-class Model M
Sort
View
CORR
2010
Springer
112views Education» more  CORR 2010»
15 years 4 months ago
Data security in mobile devices by geo locking
In this paper we present a way of hiding the data in mobile devices from being compromised. We use two level data hiding technique, where in its first level data is encrypted and ...
M. Prabu Kumar, K. Praneesh Kumar Yadav
CORR
2010
Springer
255views Education» more  CORR 2010»
15 years 4 months ago
Scalable Tensor Factorizations for Incomplete Data
The problem of incomplete data--i.e., data with missing or unknown values--in multi-way arrays is ubiquitous in biomedical signal processing, network traffic analysis, bibliometri...
Evrim Acar, Tamara G. Kolda, Daniel M. Dunlavy, Mo...
CORR
2010
Springer
156views Education» more  CORR 2010»
15 years 4 months ago
Topological analysis of the power grid and mitigation strategies against cascading failures
This paper presents a complex systems overview of a power grid network under cascading conditions. The cascading effect has been simulated on three different networks, the IEEE 300...
Sakshi Pahwa, Amelia Hodges, Caterina M. Scoglio, ...
CORR
2010
Springer
112views Education» more  CORR 2010»
15 years 4 months ago
On Finding Frequent Patterns in Event Sequences
Given a directed acyclic graph with labeled vertices, we consider the problem of finding the most common label sequences ("traces") among all paths in the graph (of some...
Andrea Campagna, Rasmus Pagh
CORR
2008
Springer
127views Education» more  CORR 2008»
15 years 4 months ago
On the long time behavior of the TCP window size process
The TCP window size process appears in the modeling of the famous Transmission Control Protocol used for data transmission over the Internet. This continuous time Markov process t...
Djalil Chafaï, Florent Malrieu, Katy Paroux