Sciweavers

16504 search results - page 3288 / 3301
» New Problems, New Solutions
Sort
View
113
Voted
JIPS
2010
389views more  JIPS 2010»
14 years 7 months ago
The Wormhole Routing Attack in Wireless Sensor Networks (WSN)
Secure routing is vital to the acceptance and use of Wireless Sensor Networks (WSN) for many applications. However, providing secure routing in WSNs is a challenging task due to th...
Lukman Sharif, Munir Ahmed
TMM
2010
194views Management» more  TMM 2010»
14 years 7 months ago
Modeling Flickr Communities Through Probabilistic Topic-Based Analysis
Abstract--With the increased presence of digital imaging devices, there also came an explosion in the amount of multimedia content available online. Users have transformed from pas...
Radu Andrei Negoescu, Daniel Gatica-Perez
TSMC
2010
14 years 7 months ago
An Architecture for Adaptive Algorithmic Hybrids
We describe a cognitive architecture for creating more robust intelligent systems by executing hybrids of algorithms based on different computational formalisms. The architecture ...
Nicholas L. Cassimatis, Perrin G. Bignoli, Magdale...
87
Voted
TSP
2010
14 years 7 months ago
Shrinkage algorithms for MMSE covariance estimation
We address covariance estimation in the sense of minimum mean-squared error (MMSE) when the samples are Gaussian distributed. Specifically, we consider shrinkage methods which are ...
Yilun Chen, Ami Wiesel, Yonina C. Eldar, Alfred O....
TVCG
2010
151views more  TVCG 2010»
14 years 7 months ago
Interactive Visual Analysis of Multiple Simulation Runs Using the Simulation Model View: Understanding and Tuning of an Electron
Multiple simulation runs using the same simulation model with different values of control parameters usually generate large data sets that capture the variational aspects of the be...
Kresimir Matkovic, Denis Gracanin, Mario Jelovic, ...
« Prev « First page 3288 / 3301 Last » Next »