Sciweavers

319 search results - page 58 / 64
» Cryptographic Assumptions: A Position Paper
Sort
View
CLEF
2010
Springer
14 years 10 months ago
Experiences at ImageCLEF 2010 using CBIR and TBIR Mixing Information Approaches
The main goal of this paper it is to present our experiments in ImageCLEF 2010 Campaign (Wikipedia retrieval task). This edition we present a different way of using textual and vis...
Joan Benavent, Xaro Benavent, Esther de Ves, Ruben...
BMCBI
2006
137views more  BMCBI 2006»
14 years 9 months ago
Bounded search for de novo identification of degenerate cis-regulatory elements
Background: The identification of statistically overrepresented sequences in the upstream regions of coregulated genes should theoretically permit the identification of potential ...
Jonathan M. Carlson, Arijit Chakravarty, Radhika S...
TSMC
2008
102views more  TSMC 2008»
14 years 9 months ago
Generalized Cost-Function-Based Forecasting for Periodically Measured Nonstationary Traffic
Abstract-- In this paper, we address the issue of forecasting for periodically measured nonstationary traffic based on statistical time series modeling. Often with time series base...
Balaji Krithikaivasan, Yong Zeng, Deep Medhi
ICRA
2010
IEEE
151views Robotics» more  ICRA 2010»
14 years 8 months ago
Probabilistic target detection by camera-equipped UAVs
— This paper is motivated by the real world problem of search and rescue by unmanned aerial vehicles (UAVs). We consider the problem of tracking a static target from a bird’sey...
Andrew Colquhoun Symington, Sonia Waharte, Simon J...
JUCS
2010
117views more  JUCS 2010»
14 years 8 months ago
NP-completeness and FPT Results for Rectilinear Covering Problems
Abstract: This paper discusses three rectilinear (that is, axis-parallel) covering problems in d dimensions and their variants. The first problem is the Rectilinear Line Cover whe...
Vladimir Estivill-Castro, Apichat Heednacram, Fran...