Sciweavers

51 search results - page 4 / 11
» Background modelling in demanding situations with confidence...
Sort
View
CNSR
2004
IEEE
15 years 1 months ago
Trusted Route Discovery with TORA Protocol
An ad-hoc network is formed when a group of wireless nodes pledge to help each other in passing packets based upon a pre-agreed protocol. Temporally Ordered Routing Algorithm (TOR...
Asad Amir Pirzada, Chris McDonald
82
Voted
BMCBI
2011
14 years 4 months ago
CODA (CrossOver Distribution Analyzer): quantitative characterization of crossover position patterns along chromosomes
Background: During meiosis, homologous chromosomes exchange segments via the formation of crossovers. This phenomenon is highly regulated; in particular, crossovers are distribute...
Franck Gauthier, Olivier C. Martin, Matthieu Falqu...
VLDB
2007
ACM
96views Database» more  VLDB 2007»
15 years 3 months ago
Privacy Skyline: Privacy with Multidimensional Adversarial Knowledge
Privacy is an important issue in data publishing. Many organizations distribute non-aggregate personal data for research, and they must take steps to ensure that an adversary cann...
Bee-Chung Chen, Raghu Ramakrishnan, Kristen LeFevr...
AP2PC
2003
Springer
15 years 2 months ago
Fuzzy Cost Modeling for Peer-to-Peer Systems
The objective of query optimizers is to select a good execution plan for a given query. In a distributed system, it is crucial for a query optimizer to have effective remote cost e...
Bo Ling, Wee Siong Ng, Yanfeng Shu, Aoying Zhou
AVSS
2009
IEEE
14 years 10 months ago
Object Tracking from Unstabilized Platforms by Particle Filtering with Embedded Camera Ego Motion
Visual tracking with moving cameras is a challenging task. The global motion induced by the moving camera moves the target object outside the expected search area, according to th...
Carlos R. del-Blanco, Narciso N. García, Lu...