Sciweavers

1050 search results - page 151 / 210
» Two methods of authenticated positioning
Sort
View
CAL
2006
15 years 3 months ago
An Efficient, Practical Parallelization Methodology for Multicore Architecture Simulation
Multiple core designs have become commonplace in the processor market, and are hence a major focus in modern computer architecture research. Thus, for both product development and ...
James Donald, Margaret Martonosi
136
Voted
RAS
2008
139views more  RAS 2008»
15 years 2 months ago
Unsupervised identification of useful visual landmarks using multiple segmentations and top-down feedback
In this paper, we tackle the problem of unsupervised selection and posterior recognition of visual landmarks in images sequences acquired by an indoor mobile robot. This is a high...
Pablo Espinace, Daniel Langdon, Alvaro Soto
117
Voted
FORMATS
2010
Springer
15 years 1 months ago
Expected Reachability-Time Games
In an expected reachability-time game (ERTG) two players, Min and Max, move a token along the transitions of a probabilistic timed automaton, so as to minimise and maximise, respec...
Vojtech Forejt, Marta Z. Kwiatkowska, Gethin Norma...
SISAP
2009
IEEE
134views Data Mining» more  SISAP 2009»
15 years 10 months ago
Searching by Similarity and Classifying Images on a Very Large Scale
—In the demonstration we will show a system for searching by similarity and automatically classifying images in a very large dataset. The demonstrated techniques are based on the...
Giuseppe Amato, Pasquale Savino
BMCBI
2011
14 years 7 months ago
A mutation degree model for the identification of transcriptional regulatory elements
Background: Current approaches for identifying transcriptional regulatory elements are mainly via the combination of two properties, the evolutionary conservation and the overrepr...
Changqing Zhang, Jin Wang, Xu Hua, Jinggui Fang, H...