Sciweavers

978 search results - page 68 / 196
» Knowledge, Probability, and Adversaries
Sort
View
ESA
2007
Springer
105views Algorithms» more  ESA 2007»
15 years 1 months ago
Finding Mobile Data: Efficiency vs. Location Inaccuracy
A token is hidden in one out of n boxes following some known probability distribution and then all the boxes are locked. The goal of a searcher is to find the token in at most D n...
Amotz Bar-Noy, Joanna Klukowska
ICC
2007
IEEE
186views Communications» more  ICC 2007»
14 years 11 months ago
On Channel Coding Selection in Time-Slotted ALOHA Packetized Multiple-Access Systems Over Rayleigh Fading Channels
— In this paper, we consider the time-slotted ALOHA packetized multiple-access system where the transmission channels obey i.i.d (independent identically distributed) Rayleigh fa...
Chen Wei, Pingyi Fan, Khaled Ben Letaief
TSP
2008
132views more  TSP 2008»
14 years 9 months ago
Robust Intervention in Probabilistic Boolean Networks
Probabilistic Boolean networks (PBNs) have been recently introduced as a paradigm for modeling genetic regulatory networks. One of the objectives of PBN modeling is to use the netw...
Ranadip Pal, Aniruddha Datta, Edward R. Dougherty
CVPR
2008
IEEE
15 years 12 months ago
Correspondences between parts of shapes with particle filters
Given two shapes, the correspondence between distinct visual features is the basis for most alignment processes and shape similarity measures. This paper presents an approach intr...
Rolf Lakämper, Marc Sobel
IWANN
2009
Springer
15 years 4 months ago
Optimising Machine-Learning-Based Fault Prediction in Foundry Production
Abstract. Microshrinkages are known as probably the most difficult defects to avoid in high-precision foundry. The presence of this failure renders the casting invalid, with the su...
Igor Santos, Javier Nieves, Yoseba K. Penya, Pablo...