Sciweavers

7195 search results - page 1402 / 1439
» On Computing Power
Sort
View
MCMASTER
1993
15 years 1 months ago
A Taste of Rewrite Systems
Abstract. This survey of the theory and applications of rewriting with equations discusses the existence and uniqueness of normal forms, the Knuth-Bendix completion procedure and i...
Nachum Dershowitz
BIBE
2007
IEEE
129views Bioinformatics» more  BIBE 2007»
15 years 1 months ago
Statistial Analysis of nucleosome occupancy and histone modification data
Abstract-- In eukaryotic cells, genomic DNAs wrap around beadlike molecules, called nucleosomes, so as to pack more compactly in the nucleus of the cell. The nucleosome is made up ...
Guo-Cheng Yuan, Jun S. Liu
CIKM
2007
Springer
15 years 1 months ago
A segment-based hidden markov model for real-setting pinyin-to-chinese conversion
Hidden markov model (HMM) is frequently used for Pinyin-toChinese conversion. But it only captures the dependency with the preceding character. Higher order markov models can brin...
Xiaohua Zhou, Xiaohua Hu, Xiaodan Zhang, Xiajiong ...
MIR
2010
ACM
191views Multimedia» more  MIR 2010»
15 years 1 months ago
Video retargeting with multi-scale trajectory optimization
Mobile devices are increasingly powerful in media storage and rendering. The prevalent request of decent video browsing on mobile devices is demanding. However, one limitation com...
Yuanning Li, YongHong Tian, Jingjing Yang, Ling-Yu...
EMNETS
2007
15 years 1 months ago
Robust node localization for wireless sensor networks
The node localization problem in Wireless Sensor Networks has received considerable attention, driven by the need to obtain a higher location accuracy without incurring a large, p...
Radu Stoleru, John A. Stankovic, Sang Hyuk Son
« Prev « First page 1402 / 1439 Last » Next »