Sciweavers

544 search results - page 58 / 109
» A New Measure of the Cluster Hypothesis
Sort
View
SUTC
2006
IEEE
15 years 7 months ago
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation
Security in wireless ad hoc networks is hard to achieve due to the vulnerability of its links, limited physical protection, and the absence of a centralized management point. Cons...
Edith C. H. Ngai, Michael R. Lyu
ICCV
2005
IEEE
16 years 3 months ago
Local Features for Object Class Recognition
In this paper we compare the performance of local detectors and descriptors in the context of object class recognition. Recently, many detectors / descriptors have been evaluated ...
Krystian Mikolajczyk, Bastian Leibe, Bernt Schiele
CLUSTER
2005
IEEE
15 years 7 months ago
Search-based Job Scheduling for Parallel Computer Workloads
To balance performance goals and allow administrators to declaratively specify high-level performance goals, we apply complete search algorithms to design on-line job scheduling p...
Sangsuree Vasupongayya, Su-Hui Chiang, B. Massey
BMCBI
2010
120views more  BMCBI 2010»
15 years 1 months ago
Examination of the relationship between essential genes in PPI network and hub proteins in reverse nearest neighbor topology
Background: In many protein-protein interaction (PPI) networks, densely connected hub proteins are more likely to be essential proteins. This is referred to as the "centralit...
Kang Ning, Hoong Kee Ng, Sriganesh Srihari, Hon Wa...
BMCBI
2006
119views more  BMCBI 2006»
15 years 1 months ago
LS-NMF: A modified non-negative matrix factorization algorithm utilizing uncertainty estimates
Background: Non-negative matrix factorisation (NMF), a machine learning algorithm, has been applied to the analysis of microarray data. A key feature of NMF is the ability to iden...
Guoli Wang, Andrew V. Kossenkov, Michael F. Ochs