Sciweavers

661 search results - page 97 / 133
» Robustness Guarantees for Anonymity
Sort
View
ICASSP
2008
IEEE
15 years 4 months ago
A game theoretic framework for incentive-based peer-to-peer live-streaming social networks
Multimedia social network analysis is an emerging research area, which analyzes the behavior of users who share multimedia content and investigates the impact of human dynamics on...
W. Sabrina Lin, H. Vicky Zhao, K. J. Ray Liu
93
Voted
IROS
2008
IEEE
177views Robotics» more  IROS 2008»
15 years 3 months ago
Estimating arm motion and force using EMG signals: On the control of exoskeletons
— There is a great effort during the last decades towards building robotic devices that are worn by humans. These devices, called exoskeletons, are used mainly for support and re...
Panagiotis K. Artemiadis, Kostas J. Kyriakopoulos
CEC
2007
IEEE
15 years 3 months ago
Covariance matrix repairing in Gaussian based EDAs
— Gaussian models are widely adopted in continuous Estimation of Distribution Algorithms (EDAs). In this paper, we analyze continuous EDAs and show that they don’t always work ...
Weishan Dong, Xin Yao
CEC
2007
IEEE
15 years 3 months ago
Memetic algorithms for inexact graph matching
—The noise-robust matching of two graphs is a hard combinatorial problem with practical importance in several domains. In practical applications, a unique solution for a given in...
Thomas Bärecke, Marcin Detyniecki
DATE
2007
IEEE
124views Hardware» more  DATE 2007»
15 years 3 months ago
Worst-case design and margin for embedded SRAM
An important aspect of Design for Yield for embedded SRAM is identifying the expected worst case behavior in order to guarantee that sufficient design margin is present. Previousl...
Robert C. Aitken, Sachin Idgunji