Sciweavers

661 search results - page 68 / 133
» Robustness Guarantees for Anonymity
Sort
View
122
Voted
CORR
2007
Springer
117views Education» more  CORR 2007»
15 years 23 days ago
Dependable k-coverage algorithms for sensor networks
– Redundant sensing capabilities are often required in sensor network applications due to various reasons, e.g. robustness, fault tolerance, or increased accuracy. At the same ti...
Simon Gyula, Miklós Molnár, Lá...
86
Voted
PROCEDIA
2010
67views more  PROCEDIA 2010»
14 years 11 months ago
Using the feasible set method for rezoning in ALE
One of the steps in the Arbitrary Lagrangian Eulerian (ALE) algorithm is the improvement of the quality of the computational mesh. This step, commonly referred to as rezoning, is ...
Markus Berndt, Milan Kucharik, Mikhail J. Shashkov
146
Voted
CVPR
2011
IEEE
14 years 9 months ago
Is face recognition really a Compressive Sensing problem?
Compressive Sensing has become one of the standard methods of face recognition within the literature. We show, however, that the sparsity assumption which underpins much of this w...
Qinfeng Shi, Anders Eriksson, Anton vandenHengel, ...
101
Voted
CORR
2011
Springer
187views Education» more  CORR 2011»
14 years 7 months ago
Global Stability Analysis of Fluid Flows using Sum-of-Squares
This paper introduces a new method for proving global stability of fluid flows through the construction of Lyapunov functionals. For finite dimensional approximations of fluid...
Paul Goulart, Sergei Chernyshenko
115
Voted
TIM
2010
139views Education» more  TIM 2010»
14 years 7 months ago
A Design Approach For Digital Controllers Using Reconfigurable Network-Based Measurements
In this paper, the authors propose and analyze a network-based control architecture for power-electronicsbuilding-block-based converters. The objective of the proposed approach is ...
Rong Liu, Antonello Monti, Ferdinanda Ponci, Anton...