Sciweavers

1050 search results - page 68 / 210
» Two methods of authenticated positioning
Sort
View
AUSAI
2006
Springer
15 years 3 months ago
Data Clustering and Visualization Using Cellular Automata Ants
This paper presents two novel features of an emergent data visualization method coined "cellular ants": unsupervised data class labeling and shape negotiation. This metho...
Andrew Vande Moere, Justin James Clayden, Andy Don...
IJCAI
2003
15 years 1 months ago
Qualitative Map Learning Based on Co-visibility of Objects
This paper proposes a unique map learning method for mobile robots based on the co-visibility infor­ mation of objects i.e., the information on whether two objects are visible at...
Takehisa Yairi, Koichi Hori
BMCBI
2010
119views more  BMCBI 2010»
14 years 12 months ago
A comparison of internal validation techniques for multifactor dimensionality reduction
Background: It is hypothesized that common, complex diseases may be due to complex interactions between genetic and environmental factors, which are difficult to detect in high-di...
Stacey J. Winham, Andrew J. Slater, Alison A. Mots...
TPDS
2008
157views more  TPDS 2008»
14 years 11 months ago
Distributed Localization Using a Moving Beacon in Wireless Sensor Networks
The localization of sensor nodes is a fundamental problem in sensor networks and can be implemented using powerful and expensive beacons. Beacons, the fewer the better, can acquire...
Bin Xiao, Hekang Chen, Shuigeng Zhou
BMCBI
2010
108views more  BMCBI 2010»
14 years 12 months ago
An intuitionistic approach to scoring DNA sequences against transcription factor binding site motifs
Background: Transcription factors (TFs) control transcription by binding to specific regions of DNA called transcription factor binding sites (TFBSs). The identification of TFBSs ...
Fernando Garcia-Alcalde, Armando Blanco, Adrian J....