Sciweavers

6833 search results - page 1339 / 1367
» Some two-character sets
Sort
View
TIFS
2008
149views more  TIFS 2008»
14 years 9 months ago
Secure Cooperation in Autonomous Mobile Ad-Hoc Networks Under Noise and Imperfect Monitoring: A Game-Theoretic Approach
In autonomous mobile ad-hoc networks, one major challenge is to stimulate cooperation among selfish nodes, especially when some nodes may be malicious. In this paper, we address co...
Wei Yu, K. J. Ray Liu
IVC
2007
131views more  IVC 2007»
14 years 9 months ago
Multi-view correspondence by enforcement of rigidity constraints
Establishing the correct correspondence between features in an image set remains a challenging problem amongst computer vision researchers. In fact, the combinatorial nature of fe...
Ricardo Oliveira, João Xavier, João ...
IVC
2007
164views more  IVC 2007»
14 years 9 months ago
Locality preserving CCA with applications to data visualization and pose estimation
- Canonical correlation analysis (CCA) is a major linear subspace approach to dimensionality reduction and has been applied to image processing, pose estimation and other fields. H...
Tingkai Sun, Songcan Chen
JACM
2007
84views more  JACM 2007»
14 years 9 months ago
Polymorphic higher-order recursive path orderings
This paper extends the termination proof techniques based on reduction orderings to a higher-order setting, by defining a family of recursive path orderings for terms of a typed ...
Jean-Pierre Jouannaud, Albert Rubio
BMCBI
2005
153views more  BMCBI 2005»
14 years 9 months ago
A comparative review of estimates of the proportion unchanged genes and the false discovery rate
Background: In the analysis of microarray data one generally produces a vector of p-values that for each gene give the likelihood of obtaining equally strong evidence of change by...
Per Broberg
« Prev « First page 1339 / 1367 Last » Next »