Sciweavers

549 search results - page 97 / 110
» Belief-Based Risk Analysis
Sort
View
WORDS
2005
IEEE
14 years 3 months ago
A Framework for Preparing Experimental Evaluation of Rerouting Mechanisms
Since the deployment of real-time sensitive applications in the Internet, the research community has been struggling to leverage the IP best-effort networks for providing QoS assu...
Reinaldo de Barros Correia, Luiz F. Rust da Costa ...
VR
1999
IEEE
152views Virtual Reality» more  VR 1999»
14 years 2 months ago
An Operator Interface for a Robot-Mounted, 3D Camera System: Project Pioneer
The purpose of Project Pioneer is to develop an exploratory robot capable of creating a three-dimensional photo-realistic map of the inside of the damaged Chornobyl Nuclear Reacto...
Fitzgerald Steele Jr., Geb W. Thomas, Theodore Bla...
CIVR
2008
Springer
245views Image Analysis» more  CIVR 2008»
13 years 11 months ago
Probabilistic optimized ranking for multimedia semantic concept detection via RVM
We present a probabilistic ranking-driven classifier for the detection of video semantic concept, such as airplane, building, etc. Most existing concept detection systems utilize ...
Yantao Zheng, Shi-Yong Neo, Tat-Seng Chua, Qi Tian
BMCBI
2010
147views more  BMCBI 2010»
13 years 10 months ago
CNstream: A method for the identification and genotyping of copy number polymorphisms using Illumina microarrays
Background: Understanding the genetic basis of disease risk in depth requires an exhaustive knowledge of the types of genetic variation. Very recently, Copy Number Variants (CNVs)...
Arnald Alonso, Antonio Julià, Raül Tor...
SIGMOD
2005
ACM
128views Database» more  SIGMOD 2005»
14 years 10 months ago
Deriving Private Information from Randomized Data
Randomization has emerged as a useful technique for data disguising in privacy-preserving data mining. Its privacy properties have been studied in a number of papers. Kargupta et ...
Zhengli Huang, Wenliang Du, Biao Chen