Sciweavers

5948 search results - page 1063 / 1190
» Computing Robust Counter-Strategies
Sort
View
134
Voted
IR
2006
15 years 3 months ago
Full-text federated search of text-based digital libraries in peer-to-peer networks
Abstract. Peer-to-peer (P2P) networks integrate autonomous computing resources without requiring a central coordinating authority, which makes them a potentially robust and scalabl...
Jie Lu, Jamie Callan
CVIU
2007
136views more  CVIU 2007»
15 years 3 months ago
MAP ZDF segmentation and tracking using active stereo vision: Hand tracking case study
A maximum a posterior probability zero disparity filter (MAP ZDF) ensures coordinated stereo fixation upon an arbitrarily moving, rotating, re-configuring hand, performing mark...
Andrew Dankers, Nick Barnes, Alexander Zelinsky
JUCS
2008
157views more  JUCS 2008»
15 years 3 months ago
Using Conjunctions and Adverbs for Author Verification
: Linguistics and stylistics have been investigated for author identification for quite a while, but recently, we have testified a impressive growth in the volume with which lawyer...
Daniel Pavelec, Luiz S. Oliveira, Edson J. R. Just...
DSP
2007
15 years 3 months ago
Variational and stochastic inference for Bayesian source separation
We tackle the general linear instantaneous model (possibly underdetermined and noisy) where we model the source prior with a Student t distribution. The conjugate-exponential char...
Ali Taylan Cemgil, Cédric Févotte, S...
125
Voted
JUCS
2006
104views more  JUCS 2006»
15 years 3 months ago
Multi-Objective Evolutionary Algorithms and Pattern Search Methods for Circuit Design Problems
: The paper concerns the design of evolutionary algorithms and pattern search methods on two circuit design problems: the multi-objective optimization of an Operational Transconduc...
Tonio Biondi, Angelo Ciccazzo, Vincenzo Cutello, S...
« Prev « First page 1063 / 1190 Last » Next »