Sciweavers

5344 search results - page 864 / 1069
» Privacy-Preserving Set Operations
Sort
View
TON
2010
192views more  TON 2010»
14 years 10 months ago
Delay analysis for wireless networks with single hop traffic and general interference constraints
We consider a class of wireless networks with general interference constraints on the set of links that can be served simultaneously at any given time. We restrict the traffic to b...
Gagan Raj Gupta, Ness B. Shroff
TWC
2010
14 years 10 months ago
Stability analysis for cognitive radio with multi-access primary transmission
Abstract--This letter analyzes the impact, from a networklayer perspective, of having a single cognitive radio transmitterreceiver pair share the spectrum with multiple primary use...
Ioannis Krikidis, Natasha Devroye, John S. Thompso...
AR
2011
14 years 10 months ago
Imitation Learning of Positional and Force Skills Demonstrated via Kinesthetic Teaching and Haptic Input
A method to learn and reproduce robot force interactions in a Human-Robot Interaction setting is proposed. The method allows a robotic manipulator to learn to perform tasks which ...
Petar Kormushev, Sylvain Calinon, Darwin G. Caldwe...
CVPR
2011
IEEE
14 years 7 months ago
A Global Optimization Approach to Robust Multi-Model Fitting
We present a novel Quadratic Program (QP) formulation for robust multi-model fitting of geometric structures in vision data. Our objective function enforces both the fidelity of...
Jin Yu, Tat-Jun Chin, David Suter
ICASSP
2011
IEEE
14 years 7 months ago
Image editing based on Sparse Matrix-Vector multiplication
This paper presents a unified model for image editing in terms of Sparse Matrix-Vector (SpMV) multiplication. In our framework, we cast image editing as a linear energy minimizat...
Ying Wang, Hongping Yan, Chunhong Pan, Shiming Xia...