Sciweavers

1747 search results - page 119 / 350
» Long Range Dependence
Sort
View
INFOCOM
2010
IEEE
15 years 4 months ago
Maximum Damage Malware Attack in Mobile Wireless Networks
—Malware attacks constitute a serious security risk that threatens to slow down the large scale proliferation of wireless applications. As a first step towards thwarting this se...
M. H. R. Khouzani, Saswati Sarkar, Eitan Altman
ESSLLI
1999
Springer
15 years 9 months ago
Towards Discontinuous Grammar
This paper presents a grammar formalism in which constituent graphs are unions of a continuous surface tree and a discontinuous deep tree. The formalism has an object-oriented desi...
Matthias T. Kromann
BMCBI
2010
85views more  BMCBI 2010»
15 years 5 months ago
Robust test method for time-course microarray experiments
Background: In a time-course microarray experiment, the expression level for each gene is observed across a number of time-points in order to characterize the temporal trajectorie...
Insuk Sohn, Kouros Owzar, Stephen L. George, Sujon...
CVPR
2009
IEEE
17 years 22 days ago
Picking the best DAISY
Local image descriptors that are highly discriminative, computational efficient, and with low storage footprint have long been a dream goal of computer vision research. In this ...
Gang Hua, Matthew Brown, Simon A. J. Winder
CVPR
2008
IEEE
16 years 7 months ago
Structure-perceptron learning of a hierarchical log-linear model
In this paper, we address the problems of deformable object matching (alignment) and segmentation with cluttered background. We propose a novel hierarchical log-linear model (HLLM...
Long Zhu, Yuanhao Chen, Xingyao Ye, Alan L. Yuille