Sciweavers

667 search results - page 37 / 134
» Quantization-Based Methods: Additive Attacks Performance Ana...
Sort
View
IJCV
2008
188views more  IJCV 2008»
14 years 11 months ago
Partial Linear Gaussian Models for Tracking in Image Sequences Using Sequential Monte Carlo Methods
The recent development of Sequential Monte Carlo methods (also called particle filters) has enabled the definition of efficient algorithms for tracking applications in image sequen...
Elise Arnaud, Étienne Mémin
CN
2007
129views more  CN 2007»
14 years 11 months ago
Performance evaluation of MAC transmission power control in wireless sensor networks
In this paper we provide a method to analytically compute the energy saving provided by the use of transmission power control (TPC) at the MAC layer in wireless sensor networks (W...
Javier Vales-Alonso, Esteban Egea-López, Al...
BMCBI
2006
153views more  BMCBI 2006»
14 years 12 months ago
Intensity-based hierarchical Bayes method improves testing for differentially expressed genes in microarray experiments
Background: The small sample sizes often used for microarray experiments result in poor estimates of variance if each gene is considered independently. Yet accurately estimating v...
Maureen A. Sartor, Craig R. Tomlinson, Scott C. We...
MMSEC
2004
ACM
133views Multimedia» more  MMSEC 2004»
15 years 5 months ago
Data hiding on 3D polygonal meshes
This paper presents a high-capacity method to embed information into the geometry of a 3D polygonal mesh. The method extends a previously reported work, to which several improveme...
Yannick Maret, Touradj Ebrahimi
NETWORKING
2004
15 years 1 months ago
Efficient, Authenticated, and Fault-Tolerant Key Agreement for Dynamic Peer Groups
We present an efficient authenticated and fault-tolerant protocol (AFTD) for tree-based key agreement. Our approach is driven by the insight that when a Diffie-Hellman blinded key ...
Li Zhou, Chinya V. Ravishankar