Sciweavers

870 search results - page 130 / 174
» Theoretical and experimental results on the goal-plan tree p...
Sort
View
INFOCOM
2008
IEEE
15 years 4 months ago
Towards a Theory of Robust Localization Against Malicious Beacon Nodes
—Localization in the presence of malicious beacon nodes is an important problem in wireless networks. Although significant progress has been made on this problem, some fundament...
Sheng Zhong, Murtuza Jadliwala, Shambhu J. Upadhya...
DCC
2008
IEEE
15 years 9 months ago
Drift Characterization of Intra Prediction and Quantization in H.264
The combination of intra prediction, transform, and quantization in the H.264/AVC video coding standard offers high compression performance in picture areas where inter prediction...
Athanasios Leontaris, Alexis M. Tourapis
ESA
2006
Springer
77views Algorithms» more  ESA 2006»
15 years 1 months ago
Negative Examples for Sequential Importance Sampling of Binary Contingency Tables
The sequential importance sampling (SIS) algorithm has gained considerable popularity for its empirical success. One of its noted applications is to the binary contingency tables p...
Ivona Bezáková, Alistair Sinclair, D...
BMCBI
2005
147views more  BMCBI 2005»
14 years 10 months ago
Calibration of mass spectrometric peptide mass fingerprint data without specific external or internal calibrants
Background: Peptide Mass Fingerprinting (PMF) is a widely used mass spectrometry (MS) method of analysis of proteins and peptides. It relies on the comparison between experimental...
Witold E. Wolski, Maciej Lalowski, Peter Jungblut,...
IJCV
2010
169views more  IJCV 2010»
14 years 8 months ago
Rigid Structure from Motion from a Blind Source Separation Perspective
We present an information theoretic approach to define the problem of structure from motion (SfM) as a blind source separation one. Given that for almost all practical joint densi...
Jeff Fortuna, Aleix M. Martínez