Sciweavers

1488 search results - page 249 / 298
» A Probabilistic Segmentation Scheme
Sort
View
CGF
2008
137views more  CGF 2008»
15 years 5 months ago
Exploiting Visibility Correlation in Direct Illumination
The visibility function in direct illumination describes the binary visibility over a light source, e.g., an environment map. Intuitively, the visibility is often strongly correla...
Petrik Clarberg, Tomas Akenine-Möller
CSDA
2008
128views more  CSDA 2008»
15 years 5 months ago
Assessing agreement of clustering methods with gene expression microarray data
In the rapidly evolving field of genomics, many clustering and classification methods have been developed and employed to explore patterns in gene expression data. Biologists face...
Xueli Liu, Sheng-Chien Lee, George Casella, Gary F...
IPM
2008
92views more  IPM 2008»
15 years 5 months ago
Searching strategies for the Hungarian language
This paper reports on the underlying IR problems encountered when dealing with the complex morphology and compound constructions found in the Hungarian language. It describes evalu...
Jacques Savoy
CORR
2007
Springer
119views Education» more  CORR 2007»
15 years 5 months ago
Distributed Source Coding in the Presence of Byzantine Sensors
—The distributed source coding problem is considered when the sensors, or encoders, are under Byzantine attack; that is, an unknown group of sensors have been reprogrammed by a m...
Oliver Kosut, Lang Tong
SCN
2008
Springer
157views Communications» more  SCN 2008»
15 years 5 months ago
Insider attack attribution using signal strength-based hyperbolic location estimation
A rogue insider, in a wireless network, is an authenticated member that exploits possession of a valid identity in order to launch an attack. A typical example is the transmission...
Christine Laurendeau, Michel Barbeau