Sciweavers

3135 search results - page 409 / 627
» Localization Algorithms: Performance Evaluation and Reliabil...
Sort
View
GECCO
2007
Springer
268views Optimization» more  GECCO 2007»
15 years 10 months ago
Vulnerability analysis and security framework (BeeSec) for nature inspired MANET routing protocols
Design, development and evaluation of adaptive, scalable, and power aware Bio/Nature inspired routing protocols has received a significant amount of attention in the recent past....
Nauman Mazhar, Muddassar Farooq
BMCBI
2007
139views more  BMCBI 2007»
15 years 4 months ago
Significance analysis of microarray transcript levels in time series experiments
Background: Microarray time series studies are essential to understand the dynamics of molecular events. In order to limit the analysis to those genes that change expression over ...
Barbara Di Camillo, Gianna Toffolo, Sreekumaran K....
ICPR
2006
IEEE
15 years 10 months ago
Note on Feature Selection for Polyp Detection in CT Colonography
In this paper we describe a computer aided detection (CAD) algorithm for robust detection of polyps in computed tomography (CT) colonography. The devised algorithm identifies sus...
Tarik A. Chowdhury, Ovidiu Ghita, Paul F. Whelan, ...
WWW
2005
ACM
16 years 5 months ago
An experimental study on large-scale web categorization
Taxonomies of the Web typically have hundreds of thousands of categories and skewed category distribution over documents. It is not clear whether existing text classification tech...
Tie-Yan Liu, Yiming Yang, Hao Wan, Qian Zhou, Bin ...
PAMI
2006
230views more  PAMI 2006»
15 years 4 months ago
Shape Registration in Implicit Spaces Using Information Theory and Free Form Deformations
We present a novel variational and statistical approach for shape registration. Shapes of interest are implicitly embedded in a higher dimensional space of distance transforms. In...
Xiaolei Huang, Nikos Paragios, Dimitris N. Metaxas