Sciweavers

635 search results - page 67 / 127
» Some Computational Problems Related to Pseudo-intents
Sort
View
APPML
2005
55views more  APPML 2005»
14 years 9 months ago
Recovering a phylogenetic tree using pairwise closure operations
A fundamental task in evolutionary biology is the amalgamation of a collection P of leaf-labelled trees into a single parent tree. A desirable feature of any such amalgamation is ...
Katharina T. Huber, Vincent Moulton, Charles Sempl...
CSDA
2004
77views more  CSDA 2004»
14 years 9 months ago
Variable selection bias in regression trees with constant fits
The greedy search approach to variable selection in regression trees with constant fits is considered. At each node, the method usually compares the maximally selected statistic a...
Yu-Shan Shih, Hsin-Wen Tsai
JMLR
2010
89views more  JMLR 2010»
14 years 4 months ago
Mass Fatality Incident Identification based on nuclear DNA evidence
This paper focuses on the use of nuclear DNA Short Tandem Repeat traits for the identification of the victims of a Mass Fatality Incident. The goal of the analysis is the assessme...
Fabio Corradi
NSF
1994
Springer
15 years 1 months ago
Physics in a Fantasy World vs. Robust Statistical Estimation
Deformable models in the \physically-based" paradigm are almost always formulated in an ad-hoc fashion, not related to physical reality { they apply the equations on physics i...
Terrance E. Boult, Samuel D. Fenster, Thomas O'Don...
APNOMS
2006
Springer
15 years 1 months ago
Network Support for TCP Version Migration
Recently, new versions of the TCP protocols such as HSTCP (High Speed TCP) has proposed to adopt the rapid growth of the Internet. However, it is important to consider a deployment...
Shingo Ata, Koichi Nagai, Ikuo Oka