Sciweavers

661 search results - page 96 / 133
» Robustness Guarantees for Anonymity
Sort
View
INFOCOM
2009
IEEE
15 years 4 months ago
Sensor Network Localization Using Sensor Perturbation
—Sensor network localization is an instance of the NP-HARD graph realization problem. Thus, methods used in practice are not guaranteed to find the correct localization, even if...
Yuanchen Zhu, Steven J. Gortler, Dylan Thurston
INFOCOM
2009
IEEE
15 years 4 months ago
Hyperbolic Embedding and Routing for Dynamic Graphs
—We propose an embedding and routing scheme for arbitrary network connectivity graphs, based on greedy routing and utilizing virtual node coordinates. In dynamic multihop packet-...
Andrej Cvetkovski, Mark Crovella
ISVC
2009
Springer
15 years 4 months ago
Combinatorial Preconditioners and Multilevel Solvers for Problems in Computer Vision and Image Processing
Abstract. Linear systems and eigen-calculations on symmetric diagonally dominant matrices (SDDs) occur ubiquitously in computer vision, computer graphics, and machine learning. In ...
Ioannis Koutis, Gary L. Miller, David Tolliver
CISIM
2008
IEEE
15 years 4 months ago
Evolution Induced Secondary Immunity: An Artificial Immune System Based Intrusion Detection System
The analogy between Immune Systems and Intrusion Detection Systems encourage the use of Artificial Immune Systems for anomaly detection in computer networks. This paper describes ...
Divyata Dal, Siby Abraham, Ajith Abraham, Sugata S...
63
Voted
ICARCV
2008
IEEE
121views Robotics» more  ICARCV 2008»
15 years 4 months ago
Synthesis and comparison of fine actuator controllers for a 3-DOF micro parallel positioning platform
—This paper presents the controller synthesis for a fine actuation system of a 3-DOF micro parallel positioning platform. The platform is composed of a dual stage servo system fo...
Taewon Seo, Deuk Soo Kang, Jongwon Kim