Sciweavers

132 search results - page 19 / 27
» A method for access authorisation through delegation network...
Sort
View
IEEECIT
2010
IEEE
13 years 6 months ago
Parallel Best Neighborhood Matching Algorithm Implementation on GPU Platform
—Error concealment restores the visual integrity of image content that has been damaged due to a bad network transmission. Best neighborhood matching (BNM) is an effective image ...
Guangyong Zhang, Liqiang He, Yanyan Zhang
BMCBI
2008
138views more  BMCBI 2008»
13 years 7 months ago
Using neural networks and evolutionary information in decoy discrimination for protein tertiary structure prediction
Background: We present a novel method of protein fold decoy discrimination using machine learning, more specifically using neural networks. Here, decoy discrimination is represent...
Ching-Wai Tan, David T. Jones
VCIP
2003
126views Communications» more  VCIP 2003»
13 years 9 months ago
Media handling for visual information retrieval in VizIR
This paper describes how the handling of visual media objects is implemented in the visual information retrieval project VizIR. Essentially, four areas are concerned: media access...
Horst Eidenberger
UIST
1998
ACM
13 years 11 months ago
Informative Things: How to Attach Information to the Real World
We describe a new method and implementation for managing information through the use of physical objects. In today’s networked world, the trend is toward working in a global vir...
Rob Barrett, Paul P. Maglio
INFOCOM
2007
IEEE
14 years 1 months ago
The Impact of Stochastic Noisy Feedback on Distributed Network Utility Maximization
—The implementation of distributed network utility maximization (NUM) algorithms hinges heavily on information feedback through message passing among network elements. In practic...
Junshan Zhang, Dong Zheng, Mung Chiang