Sciweavers

5948 search results - page 974 / 1190
» Computing Robust Counter-Strategies
Sort
View
PR
2008
218views more  PR 2008»
15 years 3 months ago
Automatic feature localisation with constrained local models
We present an efficient and robust method of locating a set of feature points in an object of interest. From a training set we construct a joint model of the appearance of each fe...
David Cristinacce, Timothy F. Cootes
BMCBI
2005
161views more  BMCBI 2005»
15 years 3 months ago
Non-linear mapping for exploratory data analysis in functional genomics
Background: Several supervised and unsupervised learning tools are available to classify functional genomics data. However, relatively less attention has been given to exploratory...
Francisco Azuaje, Haiying Wang, Alban Chesneau
149
Voted
TMC
2008
146views more  TMC 2008»
15 years 3 months ago
Cross-Layer Interaction of TCP and Ad Hoc Routing Protocols in Multihop IEEE 802.11 Networks
In this research, we first investigate the cross-layer interaction between TCP and routing protocols in the IEEE 802.11 ad hoc network. On-demand ad hoc routing protocols respond t...
Kitae Nahm, Ahmed Helmy, C. C. Jay Kuo
153
Voted
TSMC
2008
137views more  TSMC 2008»
15 years 3 months ago
A Type-2 Self-Organizing Neural Fuzzy System and Its FPGA Implementation
This paper proposes a type-2 self-organizing neural fuzzy system (T2SONFS) and its hardware implementation. The antecedent parts in each T2SONFS fuzzy rule are interval type-2 fuzz...
Chia-Feng Juang, Yu-Wei Tsao
155
Voted
FOCS
2008
IEEE
15 years 10 months ago
What Can We Learn Privately?
Learning problems form an important category of computational tasks that generalizes many of the computations researchers apply to large real-life data sets. We ask: what concept ...
Shiva Prasad Kasiviswanathan, Homin K. Lee, Kobbi ...