Sciweavers

7379 search results - page 1199 / 1476
» How Many Clusters
Sort
View
ICIP
2010
IEEE
15 years 2 months ago
A game theoretical approach for image denoising
How to adaptively choose optimal neighborhoods is very important to pixel-domain image denoising algorithms since too many neighborhoods may cause over-smooth artifacts and too fe...
Yan Chen, K. J. Ray Liu
ICPR
2010
IEEE
15 years 2 months ago
A Simulation Study on the Generative Neural Ensemble Decoding Algorithms
Brain-computer interfaces rely on accurate decoding of cortical activity to understand intended action. Algorithms for neural decoding can be broadly categorized into two groups: d...
Sung-Phil Kim, Min-Ki Kim, Gwi-Tae Park
IEAAIE
2010
Springer
15 years 2 months ago
Learning User Preferences to Maximise Occupant Comfort in Office Buildings
It is desirable to ensure that the thermal comfort conditions in offices are in line with the preferences of occupants. Controlling their offices correctly therefore requires the c...
Anika Schumann, Nic Wilson, Mateo Burillo
IOT
2010
15 years 2 months ago
A resource oriented architecture for the Web of Things
Abstract--Many efforts are centered around creating largescale networks of "smart things" found in the physical world (e.g., wireless sensor and actuator networks, embedd...
Dominique Guinard, Vlad Trifa, Erik Wilde
ISAAC
2010
Springer
276views Algorithms» more  ISAAC 2010»
15 years 2 months ago
Anonymous Fuzzy Identity-Based Encryption for Similarity Search
Abstract. In this paper, we consider the problem of predicate encryption and focus on the predicate for testing whether the hamming distance between the attribute X of a data item ...
David W. Cheung, Nikos Mamoulis, W. K. Wong, Siu-M...
« Prev « First page 1199 / 1476 Last » Next »