Sciweavers

813 search results - page 103 / 163
» A comparison of evaluation methods in coevolution
Sort
View
ICSM
2009
IEEE
14 years 3 months ago
Detection and analysis of near-miss software clones
Software clones are considered harmful in software maintenance and evolution. However, despite a decade of active research, there is a marked lack of work in the detection and ana...
Chanchal K. Roy
GLOBECOM
2007
IEEE
14 years 3 months ago
Access Delay Analysis of IEEE 802.11 DCF in the Presence of Hidden Stations
—In this paper, we present an analytical model to evaluate the hidden station effect on the access delay of the IEEE 802.11 Distributed Coordination Function (DCF) in both non-sa...
Fu-Yi Hung, Ivan Marsic
BMVC
1998
13 years 10 months ago
A Bi-Directional Integrated Model for Non-Rigid Motion Analysis
To be able to understand the motion of deformable objects, techniques in image processing and computer vision are essential for non-rigid motion analysis in this active research a...
Chunyen Liu
CSL
2010
Springer
13 years 9 months ago
Speech segmentation using regression fusion of boundary predictions
In the present work we study the appropriateness of a number of linear and non-linear regression methods, employed on the task of speech segmentation, for combining multiple phone...
Iosif Mporas, Todor Ganchev, Nikos Fakotakis
JSAC
2006
103views more  JSAC 2006»
13 years 8 months ago
Performance analysis of M-ary PPM TH-UWB systems in the presence of MUI and timing jitter
The symbol error probability (SEP) performance of time-hopping (TH) ultra-wideband (UWB) systems in the presence of multiuser interference (MUI) and timing jitter is considered wit...
N. V. Kokkalis, P. Takis Mathiopoulos, George K. K...