Sciweavers

661 search results - page 71 / 133
» Robustness Guarantees for Anonymity
Sort
View
ICDCSW
2005
IEEE
15 years 6 months ago
Increasing Attack Resiliency of Wireless Ad Hoc and Sensor Networks
An ad hoc or sensor network that is employed for security sensitive applications is expected to tolerate a certain quantity of maliciously behaving nodes. Algorithms must be desig...
Harald Vogt
103
Voted
AUTOMATICA
2006
97views more  AUTOMATICA 2006»
15 years 27 days ago
A model reference approach to safe controller changes in iterative identification and control
A controller change from a current controller which stabilises the plant to a new controller, designed on the basis of an approximate model of the plant and with guaranteed bounds...
A. Lecchini, Alexander Lanzon, Brian D. O. Anderso...
IJON
2006
111views more  IJON 2006»
15 years 24 days ago
Dynamic pruning algorithm for multilayer perceptron based neural control systems
Generalization ability of neural networks is very important and a rule of thumb for good generalization in neural systems is that the smallest system should be used to fit the tra...
Jie Ni, Qing Song
PR
2007
114views more  PR 2007»
15 years 9 days ago
Distributed Markovian segmentation: Application to MR brain scans
A situated approach to Markovian image segmentation is proposed based on a distributed, decentralized and cooperative strategy for model estimation. According to this approach, th...
Nathalie Richard, Michel Dojat, Catherine Garbay
88
Voted
ICASSP
2011
IEEE
14 years 4 months ago
An ALPS view of sparse recovery
We provide two compressive sensing (CS) recovery algorithms based on iterative hard-thresholding. The algorithms, collectively dubbed as algebraic pursuits (ALPS), exploit the res...
Volkan Cevher