Sciweavers

241 search results - page 47 / 49
» The limitation of Bayesianism
Sort
View
77
Voted
BMCBI
2007
114views more  BMCBI 2007»
14 years 10 months ago
Large scale statistical inference of signaling pathways from RNAi and microarray data
Background: The advent of RNA interference techniques enables the selective silencing of biologically interesting genes in an efficient way. In combination with DNA microarray tec...
Holger Fröhlich, Mark Fellmann, Holger Sü...
99
Voted
CORR
2008
Springer
103views Education» more  CORR 2008»
14 years 10 months ago
Quickest Change Detection of a Markov Process Across a Sensor Array
Recent attention in quickest change detection in the multi-sensor setting has been on the case where the densities of the observations change at the same instant at all the sensor...
Vasanthan Raghavan, Venugopal V. Veeravalli
IJNSEC
2006
134views more  IJNSEC 2006»
14 years 10 months ago
Physical Security Perimeters for Wireless Local Area Networks
On a wired network, physical authentication is implicitly provided by access: if a user is able to plug a cable into a network socket, he must have cleared other security checks s...
Vishal Bhargava, Mihail L. Sichitiu
104
Voted
AI
2002
Springer
14 years 10 months ago
The size distribution for Markov equivalence classes of acyclic digraph models
Bayesian networks, equivalently graphical Markov models determined by acyclic digraphs or ADGs (also called directed acyclic graphs or dags), have proved to be both effective and ...
Steven B. Gillispie, Michael D. Perlman
116
Voted
IJRR
2000
137views more  IJRR 2000»
14 years 10 months ago
Technology and Field Demonstration of Robotic Search for Antarctic Meteorites
: Meteorites are the only significant source of material from other planets and asteroids, and therefore are of immense scientific value. Antarctica's frozen and pristine envi...
Dimitrios Apostolopoulos, Michael D. Wagner, Benja...