Sciweavers

354 search results - page 36 / 71
» Recovery Rate of Clustering Algorithms
Sort
View
ICPP
2008
IEEE
15 years 9 months ago
On Clustering Tasks in IC-Optimal Dags
Strategies are developed for “fattening” the tasks of computation-dags so as to accommodate the heterogeneity of remote clients in Internet-based computing (IC). Earlier work ...
Mark Sims, Gennaro Cordasco, Arnold L. Rosenberg
132
Voted
ICIP
2004
IEEE
16 years 5 months ago
Rotation and cropping resilient data hiding with zernike moments
Most digital data hiding schemes are sensitive to simple geometric attacks namely rotation, cropping, and scaling. Of these, rotational attacks possess the capability to not only ...
Palak K. Amin, Koduvayur P. Subbalakshmi
CCGRID
2008
IEEE
15 years 9 months ago
Bad Words: Finding Faults in Spirit's Syslogs
—Accurate fault detection is a key element of resilient computing. Syslogs provide key information regarding faults, and are found on nearly all computing systems. Discovering ne...
Jon Stearley, Adam J. Oliner
SUTC
2006
IEEE
15 years 9 months ago
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation
Security in wireless ad hoc networks is hard to achieve due to the vulnerability of its links, limited physical protection, and the absence of a centralized management point. Cons...
Edith C. H. Ngai, Michael R. Lyu
115
Voted
ICRA
2007
IEEE
115views Robotics» more  ICRA 2007»
15 years 9 months ago
Sensor Selection Using Information Complexity for Multi-sensor Mobile Robot Localization
—Our sensor selection algorithm targets the problem of global self-localization of multi-sensor mobile robots. The algorithm builds on the probabilistic reasoning using Bayes fil...
Sreenivas R. Sukumar, Hamparsum Bozdogan, David L....