Sciweavers

8025 search results - page 1518 / 1605
» Combinators Introduction: An Algorithm
Sort
View
AMFG
2005
IEEE
203views Biometrics» more  AMFG 2005»
15 years 10 months ago
Learning to Fuse 3D+2D Based Face Recognition at Both Feature and Decision Levels
2D intensity images and 3D shape models are both useful for face recognition, but in different ways. While algorithms have long been developed using 2D or 3D data, recently has see...
Stan Z. Li, ChunShui Zhao, Meng Ao, Zhen Lei
153
Voted
CSB
2005
IEEE
168views Bioinformatics» more  CSB 2005»
15 years 10 months ago
cis-Regulatory Element Prediction in Mammalian Genomes
The identification of cis-regulatory elements and modules is an important step in understanding the regulation of genes. We have developed a pipeline capable of running multiple m...
Asim S. Siddiqui, Gordon Robertson, Misha Bilenky,...
GLVLSI
2005
IEEE
99views VLSI» more  GLVLSI 2005»
15 years 10 months ago
An empirical study of crosstalk in VDSM technologies
We perform a detailed study of various crosstalk scenarios in VDSM technologies by using a distributed model of the crosstalk site and make a number of key observations about the ...
Shahin Nazarian, Massoud Pedram, Emre Tuncer
INFOCOM
2005
IEEE
15 years 10 months ago
Minimum energy accumulative routing in wireless networks
— In this paper, we propose to address the energy efficient routing problem in multi-hop wireless networks with accumulative relay. In the accumulative relay model, partially ov...
Jiangzhuo Chen, Lujun Jia, Xin Liu, Guevara Noubir...
KBSE
2005
IEEE
15 years 10 months ago
Secure sharing between untrusted users in a transparent source/binary deployment model
The Nix software deployment system is based on the paradigm of transparent source/binary deployment: distributors deploy descriptors that build components from source, while clien...
Eelco Dolstra
« Prev « First page 1518 / 1605 Last » Next »