Sciweavers

1050 search results - page 192 / 210
» Two methods of authenticated positioning
Sort
View
JIB
2007
153views more  JIB 2007»
14 years 11 months ago
Duplicate detection of 2D-NMR Spectra
2D-Nuclear magnetic resonance (NMR) spectra are used in the (structural) analysis of small molecules. In contrast to 1D-NMR spectra, 2D-NMR spectra correlate the chemical shifts o...
Alexander Hinneburg, Björn Egert, Andrea Porz...
64
Voted
TSP
2008
79views more  TSP 2008»
14 years 11 months ago
New Blind Block Synchronization for Transceivers Using Redundant Precoders
This paper studies the blind block synchronization problem in block transmission systems using linear redundant precoders (LRP). Two commonly used LRP systems, namely, zero padding...
Borching Su, P. P. Vaidyanathan
ICCV
2001
IEEE
16 years 1 months ago
Noise in Bilinear Problems
: Despite the wide application of bilinear problems to problems both in computer vision and in other fields, their behaviour under the effects of noise is still poorly understood. ...
John A. Haddon, David A. Forsyth
ECCV
2002
Springer
16 years 1 months ago
Multi-view Matching for Unordered Image Sets, or "How Do I Organize My Holiday Snaps?"
There has been considerable success in automated reconstruction for image sequences where small baseline algorithms can be used to establish matches across a number of images. In c...
Frederik Schaffalitzky, Andrew Zisserman
ICSE
2008
IEEE-ACM
16 years 15 days ago
Predicting accurate and actionable static analysis warnings: an experimental approach
Static analysis tools report software defects that may or may not be detected by other verification methods. Two challenges complicating the adoption of these tools are spurious f...
Joseph R. Ruthruff, John Penix, J. David Morgentha...