Sciweavers

Share
4930 search results - page 985 / 986
» Learning minimal abstractions
Sort
View
JSAC
2010
188views more  JSAC 2010»
11 years 10 days ago
Random-walk based approach to detect clone attacks in wireless sensor networks
Abstract--Wireless sensor networks (WSNs) deployed in hostile environments are vulnerable to clone attacks. In such attack, an adversary compromises a few nodes, replicates them, a...
Yingpei Zeng, Jiannong Cao, Shigeng Zhang, Shanqin...
TASLP
2010
138views more  TASLP 2010»
11 years 9 days ago
Glimpsing IVA: A Framework for Overcomplete/Complete/Undercomplete Convolutive Source Separation
Abstract--Independent vector analysis (IVA) is a method for separating convolutedly mixed signals that significantly reduces the occurrence of the well-known permutation problem in...
Alireza Masnadi-Shirazi, Wenyi Zhang, Bhaskar D. R...
TMM
2010
194views Management» more  TMM 2010»
11 years 8 days ago
Modeling Flickr Communities Through Probabilistic Topic-Based Analysis
Abstract--With the increased presence of digital imaging devices, there also came an explosion in the amount of multimedia content available online. Users have transformed from pas...
Radu Andrei Negoescu, Daniel Gatica-Perez
VR
2011
IEEE
309views Virtual Reality» more  VR 2011»
10 years 9 months ago
Two-handed tangible interaction techniques for composing augmented blocks
Abstract Modeling tools typically have their own interaction methods for combining virtual objects. For realistic composition in 3D space, many researchers from the fields of virt...
Hyeongmook Lee, Mark Billinghurst, Woontack Woo
BMCBI
2011
10 years 9 months ago
BICEPP: an example-based statistical text mining method for predicting the binary characteristics of drugs
Background: The identification of drug characteristics is a clinically important task, but it requires much expert knowledge and consumes substantial resources. We have developed ...
Frank P. Y. Lin, Stephen Anthony, Thomas M. Polase...
books