Sciweavers

17164 search results - page 3418 / 3433
» Applications of Sensor Networks
Sort
View
JAPLL
2007
104views more  JAPLL 2007»
13 years 7 months ago
An axiomatization of family resemblance
We invoke concepts from the theory of hypergraphs to give a measure of the closeness of family resemblance, and to make precise the idea of a composite likeness. It is shown that f...
Ray E. Jennings, Dorian X. Nicholson
NECO
2007
150views more  NECO 2007»
13 years 7 months ago
Reinforcement Learning, Spike-Time-Dependent Plasticity, and the BCM Rule
Learning agents, whether natural or artificial, must update their internal parameters in order to improve their behavior over time. In reinforcement learning, this plasticity is ...
Dorit Baras, Ron Meir
PRL
2007
287views more  PRL 2007»
13 years 7 months ago
2D and 3D face recognition: A survey
Government agencies are investing a considerable amount of resources into improving security systems as result of recent terrorist events that dangerously exposed flaws and weakn...
Andrea F. Abate, Michele Nappi, Daniel Riccio, Gab...
TCOM
2008
146views more  TCOM 2008»
13 years 7 months ago
Noncoherent eigenbeamforming and interference suppression for outdoor OFDM systems
Abstract--We investigate a new approach to uplink communications in wideband outdoor cellular systems that can take advantage of multiple antennas at the base station in a scalable...
Noah Jacobsen, Gwen Barriac, Upamanyu Madhow
TITB
2008
204views more  TITB 2008»
13 years 7 months ago
A Cryptographic Approach to Securely Share and Query Genomic Sequences
To support large-scale biomedical research projects, organizations need to share person-specific genomic sequences without violating the privacy of their data subjects. In the past...
Murat Kantarcioglu, Wei Jiang, Ying Liu, Bradley M...
« Prev « First page 3418 / 3433 Last » Next »