Sciweavers

51 search results - page 4 / 11
» Background modelling in demanding situations with confidence...
Sort
View
CNSR
2004
IEEE
13 years 11 months ago
Trusted Route Discovery with TORA Protocol
An ad-hoc network is formed when a group of wireless nodes pledge to help each other in passing packets based upon a pre-agreed protocol. Temporally Ordered Routing Algorithm (TOR...
Asad Amir Pirzada, Chris McDonald
BMCBI
2011
13 years 2 months ago
CODA (CrossOver Distribution Analyzer): quantitative characterization of crossover position patterns along chromosomes
Background: During meiosis, homologous chromosomes exchange segments via the formation of crossovers. This phenomenon is highly regulated; in particular, crossovers are distribute...
Franck Gauthier, Olivier C. Martin, Matthieu Falqu...
VLDB
2007
ACM
96views Database» more  VLDB 2007»
14 years 1 months ago
Privacy Skyline: Privacy with Multidimensional Adversarial Knowledge
Privacy is an important issue in data publishing. Many organizations distribute non-aggregate personal data for research, and they must take steps to ensure that an adversary cann...
Bee-Chung Chen, Raghu Ramakrishnan, Kristen LeFevr...
AP2PC
2003
Springer
14 years 28 days ago
Fuzzy Cost Modeling for Peer-to-Peer Systems
The objective of query optimizers is to select a good execution plan for a given query. In a distributed system, it is crucial for a query optimizer to have effective remote cost e...
Bo Ling, Wee Siong Ng, Yanfeng Shu, Aoying Zhou
AVSS
2009
IEEE
13 years 8 months ago
Object Tracking from Unstabilized Platforms by Particle Filtering with Embedded Camera Ego Motion
Visual tracking with moving cameras is a challenging task. The global motion induced by the moving camera moves the target object outside the expected search area, according to th...
Carlos R. del-Blanco, Narciso N. García, Lu...