Sciweavers

476 search results - page 60 / 96
» A Speculation-based Approach for Performance and Dependabili...
Sort
View
BMCBI
2008
159views more  BMCBI 2008»
13 years 8 months ago
Multivariate hierarchical Bayesian model for differential gene expression analysis in microarray experiments
Background: Identification of differentially expressed genes is a typical objective when analyzing gene expression data. Recently, Bayesian hierarchical models have become increas...
Hongya Zhao, Kwok-Leung Chan, Lee-Ming Cheng, Hong...
TON
2010
136views more  TON 2010»
13 years 2 months ago
Distributed Opportunistic Scheduling With Two-Level Probing
Distributed opportunistic scheduling (DOS) is studied for wireless ad-hoc networks in which many links contend for the channel using random access before data transmissions. Simpl...
P. S. Chandrashekhar Thejaswi, Junshan Zhang, Man-...
GLOBECOM
2006
IEEE
14 years 2 months ago
Service Differentiation by a Link Layer Protocol Based on SR ARQ over a Satellite Channel
— This paper studies the case where multiple IP flows are aggregated over a single satellite channel and an error recovery by retransmissions is performed by SelectiveRepeat (SR...
Toshihiro Shikama, Takashi Watanabe, Tadanori Mizu...
ICDAR
2003
IEEE
14 years 1 months ago
N-Gram and N-Class Models for On line Handwriting Recognition
This paper highlights the interest of a language model in increasing the performances of on-line handwriting recognition systems. Models based on statistical approaches, trained o...
Freddy Perraud, Christian Viard-Gaudin, Emmanuel M...
ICIAR
2010
Springer
14 years 26 days ago
Two-Factor Authentication or How to Potentially Counterfeit Experimental Results in Biometric Systems
Two-factor authentication has been introduced in order to enhance security in authentication systems. Different factors have been introduced, which are combined for means of contr...
Christian Rathgeb, Andreas Uhl