Sciweavers

1050 search results - page 112 / 210
» Two methods of authenticated positioning
Sort
View
ISBRA
2009
Springer
15 years 8 months ago
Analysis of Cis-Regulatory Motifs in Cassette Exons by Incorporating Exon Skipping Rates
Identification of cis-regulatory motifs has long been a hotspot in the study of alternative splicing. We propose a two-step approach: we first identify k-mer seed motifs by testing...
Sihui Zhao, Jihye Kim, Steffen Heber
ISVC
2009
Springer
15 years 8 months ago
Multiple-view Video Coding Using Depth Map in Projective Space
Abstract. In this paper a new video coding by using multiple uncalibrated cameras is proposed. We consider the redundancy between the cameras view points and efficiently compress b...
Nina Yorozu, Yuko Uematsu, Hideo Saito
SIBGRAPI
2007
IEEE
15 years 8 months ago
Bipartite graph matching for video clip localization
Video clip localization consists in identifying real positions of a specific video clip in a video stream. To cope with this problem, we propose a new approach considering the ma...
Zenilton Kleber G. do Patrocínio Jr., Silvi...
VTC
2007
IEEE
15 years 8 months ago
User Demand Based WLAN Design and Optimisation
— The rapid increase in the use of IEEE 802.11 Wireless Local Area Networks (WLAN) for a diverse range of applications, has introduced an increased complexity into WLAN design, a...
Alan McGibney, Martin Klepal, Dirk Pesch
FPL
2007
Springer
105views Hardware» more  FPL 2007»
15 years 8 months ago
A floating-point Extended Kalman Filter implementation for autonomous mobile robots
Localization and Mapping are two of the most important capabilities for autonomous mobile robots and have been receiving considerable attention from the scientific computing commu...
Vanderlei Bonato, Eduardo Marques, George A. Const...