Sciweavers

2869 search results - page 486 / 574
» Metropolis-Hastings algorithms with adaptive proposals
Sort
View
105
Voted
GECCO
2008
Springer
146views Optimization» more  GECCO 2008»
15 years 1 months ago
A formal performance modeling framework for bio-inspired ad hoc routing protocols
Bio-inspired ad hoc routing is an active area of research. The designers of these algorithms predominantly evaluate the performance of their protocols with the help of simulation ...
Muhammad Saleem, Syed Ali Khayam, Muddassar Farooq
ASIACRYPT
2011
Springer
14 years 19 days ago
The Leakage-Resilience Limit of a Computational Problem Is Equal to Its Unpredictability Entropy
A cryptographic assumption is the (unproven) mathematical statement that a certain computational problem (e.g. factoring integers) is computationally hard. The leakage-resilience l...
Divesh Aggarwal, Ueli Maurer
WMASH
2003
ACM
15 years 5 months ago
An end-to-end multi-path smooth handoff scheme for stream media
In the near future, wide variety of wireless networks will be merged into the Internet and allow users to continue their application with higher degree of mobility. In such enviro...
Yi Pan, Meejeong Lee, Jaime Bae Kim, Tatsuya Suda
127
Voted
BMCBI
2010
176views more  BMCBI 2010»
15 years 23 days ago
Reverse engineering gene regulatory network from microarray data using linear time-variant model
nd: Gene regulatory network is an abstract mapping of gene regulations in living cells that can help to predict the system behavior of living organisms. Such prediction capability...
Mitra Kabir, Nasimul Noman, Hitoshi Iba
JEI
2006
246views more  JEI 2006»
15 years 18 days ago
Fuzzy logic recursive motion detection and denoising of video sequences
We propose a fuzzy logic recursive scheme for motion detection and spatiotemporal filtering that can deal with the Gaussian noise and unsteady illumination conditions in both the t...
Vladimir Zlokolica, Aleksandra Pizurica, Wilfried ...