Sciweavers

TAP
2008
Springer
102views Hardware» more  TAP 2008»
13 years 4 months ago
Visualizing graphs in three dimensions
It has been known for some time that larger graphs can be interpreted if laid out in 3D and displayed with stereo and/or motion depth cues to support spatial perception. However, ...
Colin Ware, Peter Mitchell
IJDE
2007
105views more  IJDE 2007»
13 years 4 months ago
Mobile Phone Forensics Tool Testing: A Database Driven Approach
The Daubert process used in the admissibility of evidence contains major guidelines applied in assessing forensic procedures, two of which are testing and error rates. The Digital...
Ibrahim M. Baggili, Richard Mislan, Marcus Rogers
CORR
2007
Springer
118views Education» more  CORR 2007»
13 years 4 months ago
Error Rate Analysis for Peaky Signaling over Fading Channels
—In this paper, the performance of signaling strategies with high peak-to-average power ratio is analyzed in both coherent and noncoherent fading channels. Two modulation schemes...
Mustafa Cenk Gursoy
CORR
2007
Springer
112views Education» more  CORR 2007»
13 years 4 months ago
On Optimum Power Allocation for the V-BLAST
—A unified analytical framework for optimum power allocation in the unordered V-BLAST algorithm and its comparative performance analysis are presented. Compact closed-form appro...
Victoria Kostina, Sergey Loyka
BMCBI
2007
101views more  BMCBI 2007»
13 years 4 months ago
Robust detection and verification of linear relationships to generate metabolic networks using estimates of technical errors
Background: The size and magnitude of the metabolome, the ratio between individual metabolites and the response of metabolic networks is controlled by multiple cellular factors. A...
Frank Kose, Jan Budczies, Matthias Holschneider, O...
BIOSIG
2003
89views Biometrics» more  BIOSIG 2003»
13 years 6 months ago
How to Test the Performance of Speech Verifiers and Statistical Evaluation
Abstract: Biometric identification and verification technologies, in the past, have promised high performance levels. Such performance statements lead to the assumption, that these...
Jörg Tacke, Andreas Wolf
ISSE
2008
13 years 6 months ago
Agatha: Multimodal Biometric Authentication Platform in Large-Scale Databases
Biometric technologies are each time more demanded for security applications. In this sense, systems for identifying people are gaining popularity, especially in governmental sect...
David Hernando, David Gómez, Javier Rodr&ia...
MCS
2010
Springer
13 years 6 months ago
A Multi-Classifier System for Off-Line Signature Verification Based on Dissimilarity Representation
Abstract. Although widely used to reduce error rates of difficult pattern recognition problems, multiple classifier systems are not in widespread use in off-line signature verifica...
Luana Batista, Eric Granger, Robert Sabourin
CIARP
2008
Springer
13 years 6 months ago
Ensemble Approaches to Facial Action Unit Classification
Facial action unit (au) classification is an approach to face expression recognition that decouples the recognition of expression from individual actions. In this paper, upper face...
Terry Windeatt, Kaushala Dias
CCGRID
2001
IEEE
13 years 8 months ago
Sabotage-Tolerance Mechanisms for Volunteer Computing Systems
In this paper, we address the new problem of protecting volunteer computing systems from malicious volunteers who submit erroneous results by presenting sabotagetolerance mechanis...
Luis F. G. Sarmenta