Sciweavers

3652 search results - page 415 / 731
» A study of query length
Sort
View
110
Voted
SP
2009
IEEE
15 years 11 months ago
The Mastermind Attack on Genomic Data
In this paper, we study the degree to which a genomic string, Q, leaks details about itself any time it engages in comparison protocols with a genomic querier, Bob, even if those ...
Michael T. Goodrich
WG
2009
Springer
15 years 11 months ago
Distance d-Domination Games
Abstract. We study graph searching games where a number of cops try to capture a robber that is hiding in a system of tunnels modelled as a graph. While the current position of the...
Stephan Kreutzer, Sebastian Ordyniak
ICRA
2008
IEEE
161views Robotics» more  ICRA 2008»
15 years 11 months ago
Accurate calibration of intrinsic camera parameters by observing parallel light pairs
— This study describes a method of estimating the intrinsic parameters of a perspective camera. In previous calibration methods for perspective cameras, the intrinsic and extrins...
Ryusuke Sagawa, Yasushi Yagi
132
Voted
DASFAA
2006
IEEE
136views Database» more  DASFAA 2006»
15 years 10 months ago
Mining Outliers in Spatial Networks
Outlier analysis is an important task in data mining and has attracted much attention in both research and applications. Previous work on outlier detection involves different type...
Wen Jin, Yuelong Jiang, Weining Qian, Anthony K. H...
ICAT
2006
IEEE
15 years 10 months ago
A Novel Sound Localization Experiment for Mobile Audio Augmented Reality Applications
This paper describes a subjective experiment in progress to study human sound localization using mobile audio augmented reality systems. The experiment also serves to validate a ne...
Nick Mariette