Sciweavers

591 search results - page 94 / 119
» Vector Probability Diffusion
Sort
View
141
Voted
RECOMB
2006
Springer
16 years 5 months ago
A Sublinear-Time Randomized Approximation Scheme for the Robinson-Foulds Metric
The Robinson-Foulds (RF) metric is the measure most widely used in comparing phylogenetic trees; it can be computed in linear time using Day's algorithm. When faced with the n...
Nicholas D. Pattengale, Bernard M. E. Moret
171
Voted
ICASSP
2009
IEEE
15 years 11 months ago
Lattice-based MLLR for speaker recognition
Maximum-Likelihod Linear Regression (MLLR) transform coefficients have shown to be useful features for text-independent speaker recognition systems. These use MLLR coefficients ...
Marc Ferras, Claude Barras, Jean-Luc Gauvain
INFOCOM
2009
IEEE
15 years 11 months ago
An Efficient Privacy-Preserving Scheme against Traffic Analysis Attacks in Network Coding
— Privacy threat is one of the critical issues in network coding, where attacks such as traffic analysis can be easily launched by a malicious adversary once enough encoded packe...
Yanfei Fan, Yixin Jiang, Haojin Zhu, Xuemin Shen
ICRA
2008
IEEE
185views Robotics» more  ICRA 2008»
15 years 11 months ago
Human detection using multimodal and multidimensional features
— This paper presents a novel human detection method based on a Bayesian fusion approach using laser range data and camera images. Laser range data analysis groups data points wi...
Luciano Spinello, Roland Siegwart
WCNC
2008
IEEE
15 years 11 months ago
Modeling an Opportunistic Spectrum Sharing System with a Correlated Arrival Process
— In an opportunistic spectrum sharing (OSS) wireless network there are two types of users: primary users and secondary users. The primary users own the license for the system ba...
Shensheng Tang, Brian L. Mark