Sciweavers

5580 search results - page 794 / 1116
» Randomized priority algorithms
Sort
View
111
Voted
MOBIHOC
2010
ACM
15 years 1 months ago
Security-capacity trade-off in large wireless networks using keyless secrecy
We investigate the scalability of a class of algorithms that exploit the dynamics of wireless fading channels to achieve secret communication in a large wireless network of n rando...
Sudarshan Vasudevan, Dennis Goeckel, Donald F. Tow...
NAACL
2010
15 years 1 months ago
Summarizing Microblogs Automatically
In this paper, we focus on a recent Web trend called microblogging, and in particular a site called Twitter. The content of such a site is an extraordinarily large number of small...
Beaux Sharifi, Mark-Anthony Hutton, Jugal K. Kalit...
GREC
2009
Springer
15 years 1 months ago
Robust and Precise Circular Arc Detection
In this paper we present a method to robustly detect circular arcs in a line drawing image. The method is fast, robust and very reliable, and is capable of assessing the quality of...
Bart Lamiroy, Yassine Guebbas
ICRA
2009
IEEE
158views Robotics» more  ICRA 2009»
15 years 1 months ago
MMM-classification of 3D range data
This paper presents a method for accurately segmenting and classifying 3D range data into particular object classes. Object classification of input images is necessary for applicat...
Anuraag Agrawal, Atsushi Nakazawa, Haruo Takemura
CORR
2010
Springer
94views Education» more  CORR 2010»
15 years 25 days ago
The Stability of Low-Rank Matrix Reconstruction: a Constrained Singular Value View
The stability of low-rank matrix reconstruction is investigated in this paper. The -constrained minimal singular value ( -CMSV) of the measurement operator is shown to determine t...
Gongguo Tang, Arye Nehorai