Sciweavers

1017 search results - page 143 / 204
» A General Model for Authenticated Data Structures
Sort
View
MOBIHOC
2009
ACM
14 years 9 months ago
Multicasting in delay tolerant networks: a social network perspective
Node mobility and end-to-end disconnections in Delay Tolerant Networks (DTNs) greatly impair the effectiveness of data dissemination. Although social-based approaches can be used ...
Wei Gao, Qinghua Li, Bo Zhao, Guohong Cao
RECOMB
2004
Springer
14 years 9 months ago
Computational identification of evolutionarily conserved exons
Phylogenetic hidden Markov models (phylo-HMMs) have recently been proposed as a means for addressing a multispecies version of the ab initio gene prediction problem. These models ...
Adam C. Siepel, David Haussler
CP
2007
Springer
14 years 3 months ago
AND/OR Multi-valued Decision Diagrams for Constraint Optimization
We propose a new top down search-based algorithm for compiling AND/OR Multi-Valued Decision Diagrams (AOMDDs), as representations of the optimal set of solutions for constraint opt...
Robert Mateescu, Radu Marinescu 0002, Rina Dechter
CIVR
2010
Springer
295views Image Analysis» more  CIVR 2010»
14 years 27 days ago
Signature Quadratic Form Distance
The Signature Quadratic Form Distance is an adaptive similarity measure for flexible content-based feature representations of multimedia data. In this paper, we present a deep su...
Christian Beecks, Merih Seran Uysal, Thomas Seidl
AMDO
2006
Springer
14 years 22 days ago
Ballistic Hand Movements
Common movements like reaching, striking, etc. observed during surveillance have highly variable target locations. This puts appearance-based techniques at a disadvantage for model...
Shiv Naga Prasad Vitaladevuni, Vili Kellokumpu, La...