Sciweavers

2311 search results - page 131 / 463
» Robustness and Generalization
Sort
View
SASN
2006
ACM
15 years 10 months ago
Impact of optimal MAC layer attacks on the network layer
Node misbehavior in wireless ad hoc networks leads to sudden unpredictable changes in network topology, resulting in fluctuation of traffic load and capacity for already existin...
Svetlana Radosavac, John S. Baras, George V. Moust...
ICPR
2002
IEEE
15 years 9 months ago
Mutual Information Based Evaluation of 3D Building Models
This paper presents a metric based on information theory principles that compares 3D object models to images. The metric is based on the formulation of the mutual information betw...
Ildiko Suveg, George Vosselman
VISAPP
2008
15 years 6 months ago
Pose Clustering From Stereo Data
Abstract. This article describes an algorithm for pose or motion estimation based on clustering of parameters in the six-dimensional pose space. The parameter samples are computed ...
Ulrich Hillenbrand
GECCO
2005
Springer
156views Optimization» more  GECCO 2005»
15 years 10 months ago
Introducing a watermarking with a multi-objective genetic algorithm
We propose an evolutionary algorithm for the enhancement of digital semi-fragile watermaking based on the manipulation of the image discrete cosine transform (DCT). The algorithm ...
Diego Sal Díaz, Manuel Grana Romay
SASN
2004
ACM
15 years 10 months ago
Resilient aggregation in sensor networks
This paper studies security for data aggregation in sensor networks. Current aggregation schemes were designed without security in mind and there are easy attacks against them. We...
David Wagner