Sciweavers

754 search results - page 132 / 151
» Robust information-theoretic clustering
Sort
View
JCP
2008
206views more  JCP 2008»
14 years 9 months ago
SW-R2P: A Trusted Small World Overlay P2P Network with Zero Knowledge Identification
In order to implement both the efficiency and security in the Peer-to-Peer (P2P) network, we design a trusted small world overlay P2P network with the role based and reputation bas...
Yingjie Xia, Guanghua Song, Yao Zheng
83
Voted
JFR
2006
88views more  JFR 2006»
14 years 9 months ago
Discovering natural kinds of robot sensory experiences in unstructured environments
We derive categories directly from robot sensor data to address the symbol grounding problem. Unlike model-based approaches where human intuitive correspondences are sought betwee...
Daniel H. Grollman, Odest Chadwicke Jenkins, Frank...
68
Voted
TCSV
2008
94views more  TCSV 2008»
14 years 9 months ago
Human Activity Recognition Based on Silhouette Directionality
Recent advances in computer vision and pattern recognition have fuelled numerous initiatives that aim to intelligently recognize human activities. In this paper, we propose an algo...
Meghna Singh, Anup Basu, Mrinal K. Mandal
TIFS
2008
208views more  TIFS 2008»
14 years 9 months ago
A Network Coding Approach to Secret Key Distribution
We consider the problem of secret key distribution in a sensor network with multiple scattered sensor nodes and a mobile device that can be used to bootstrap the network. Our main...
Paulo F. Oliveira, João Barros
JCB
2007
92views more  JCB 2007»
14 years 9 months ago
Neighbor Joining Algorithms for Inferring Phylogenies via LCA Distances
Reconstructing phylogenetic trees efficiently and accurately from distance estimates is an ongoing challenge in computational biology from both practical and theoretical consider...
Ilan Gronau, Shlomo Moran