Sciweavers

3639 search results - page 711 / 728
» Provenance as Dependency Analysis
Sort
View
DATAMINE
2006
176views more  DATAMINE 2006»
14 years 9 months ago
A Bit Level Representation for Time Series Data Mining with Shape Based Similarity
Clipping is the process of transforming a real valued series into a sequence of bits representing whether each data is above or below the average. In this paper, we argue that clip...
Anthony J. Bagnall, Chotirat (Ann) Ratanamahatana,...
BMCBI
2007
144views more  BMCBI 2007»
14 years 9 months ago
Automatic delineation of malignancy in histopathological head and neck slides
Background: Histopathology, which is one of the most important routines of all laboratory procedures used in pathology, is decisive for the diagnosis of cancer. Experienced histop...
Mutlu Mete, Xiaowei Xu, Chun-Yang Fan, Gal Shafirs...
COMCOM
2007
100views more  COMCOM 2007»
14 years 9 months ago
Sensor replacement using mobile robots
Sensor replacement is important for sensor networks to provide continuous sensing services. Upon sensor node failures, holes (uncovered areas) may appear in the sensing coverage. ...
Yongguo Mei, Changjiu Xian, Saumitra M. Das, Y. Ch...
IJRR
2006
110views more  IJRR 2006»
14 years 9 months ago
Optimal Mass Distribution for Passivity-Based Bipedal Robots
This paper reports how and to what extent the mass distribution of a passive dynamic walker can be tuned to maximize walking speed and stability. An exploration of the complete pa...
Joachim Haß, J. Michael Herrmann, Theo Geise...
CORR
2007
Springer
117views Education» more  CORR 2007»
14 years 9 months ago
Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions
An analysis of steganographic systems subject to the following perfect undetectability condition is presented in this paper. Following embedding of the message into the covertext,...
Ying Wang, Pierre Moulin