Sciweavers

2061 search results - page 82 / 413
» Authorization for Metacomputing Applications
Sort
View
CVPR
2008
IEEE
15 years 22 days ago
A similarity measure between unordered vector sets with application to image categorization
We present a novel approach to compute the similarity between two unordered variable-sized vector sets. To solve this problem, several authors have proposed to model each vector s...
Yan Liu, Florent Perronnin
84
Voted
SIAMIS
2008
93views more  SIAMIS 2008»
15 years 15 days ago
Convex Source Support and Its Application to Electric Impedance Tomography
The aim in electric impedance tomography is to recover the conductivity inside a physical body from boundary measurements of current and voltage. In many situations of practical im...
Martin Hanke, Nuutti Hyvönen, Stefanie Reussw...
108
Voted
MIS
2007
Springer
159views Multimedia» more  MIS 2007»
15 years 2 days ago
The application of fluid mobility modelling in wireless cellular networks
Mobility models, synthetic or trace, try to accurately model the movement of a single user or a group of users. Models are used in simulators and emulators to investigate the cons...
Ronan J. Skehill, Sean McGrath
ISNN
2010
Springer
14 years 11 months ago
MULP: A Multi-Layer Perceptron Application to Long-Term, Out-of-Sample Time Series Prediction
Abstract. A forecasting approach based on Multi-Layer Perceptron (MLP) Artificial Neural Networks (named by the authors MULP) is proposed for the NN5 111 time series long-term, out...
Eros Pasero, Giovanni Raimondo, Suela Ruffa
114
Voted
PERCOM
2010
ACM
14 years 10 months ago
Privacy-preserving admission to mobile peer-to-peer groups
Mobile peer-to-peer groups, which do not require any pre-deployed infrastructure or trusted centralized authority are valuable for a variety of collaborative applications. This wor...
Mark Manulis