Sciweavers

219 search results - page 30 / 44
» The Mathematics of Boundaries: A Beginning
Sort
View
104
Voted
ACSAC
2009
IEEE
15 years 8 months ago
Online Sketching of Network Flows for Real-Time Stepping-Stone Detection
Abstract—We present an efficient and robust stepping-stone detection scheme based on succinct packet-timing sketches of network flows. The proposed scheme employs an online alg...
Baris Coskun, Nasir D. Memon
103
Voted
GECCO
2009
Springer
127views Optimization» more  GECCO 2009»
15 years 8 months ago
Geometrical insights into the dendritic cell algorithm
This work examines the dendritic cell algorithm (DCA) from a mathematical perspective. By representing the signal processing phase of the algorithm using the dot product it is sho...
Thomas Stibor, Robert Oates, Graham Kendall, Jonat...
104
Voted
CVPR
2008
IEEE
15 years 8 months ago
3D shape reconstruction of Mooney faces
Two-tone (“Mooney”) images seem to arouse vivid 3D percept of faces, both familiar and unfamiliar, despite their seemingly poor content. Recent psychological and fMRI studies ...
Ira Kemelmacher-Shlizerman, Ronen Basri, Boaz Nadl...
GLOBECOM
2007
IEEE
15 years 8 months ago
A Steepest Descent Relocation Algorithm for Placement of Sinks in a Sensor Network
— In this paper we use an information flow model for placement of traffic sinks in a wireless sensor network. Our mathematical model translates a communication network composed...
Mehdi Kalantari, Mark A. Shayman
AINA
2005
IEEE
15 years 7 months ago
A Practical Modelling Notation for Secure Distributed Computation
Mobile code computation has lead to a new paradigm of distributed computation. A mobile process can move from site to site and interact with the resources as a local process. To p...
Yih-Jiun Lee, Peter Henderson