Sciweavers

4208 search results - page 828 / 842
» Better Selection of the Best
Sort
View
ENTCS
2006
134views more  ENTCS 2006»
13 years 6 months ago
Anonymity in Probabilistic and Nondeterministic Systems
Anonymity means that the identity of the user performing a certain action is maintained secret. The protocols for ensuring anonymity often use random mechanisms which can be descr...
Catuscia Palamidessi
BMCBI
2007
153views more  BMCBI 2007»
13 years 6 months ago
Analysis of nanopore detector measurements using Machine-Learning methods, with application to single-molecule kinetic analysis
Background: A nanopore detector has a nanometer-scale trans-membrane channel across which a potential difference is established, resulting in an ionic current through the channel ...
Matthew Landry, Stephen Winters-Hilt
CORR
2007
Springer
189views Education» more  CORR 2007»
13 years 6 months ago
Diversity-Multiplexing Tradeoff of Asynchronous Cooperative Diversity in Wireless Networks
Synchronization of relay nodes is an important and critical issue in exploiting cooperative diversity in wireless networks. In this paper, two asynchronous cooperative diversity s...
Shuangqing Wei
JFR
2008
103views more  JFR 2008»
13 years 6 months ago
Monte Carlo localization in outdoor terrains using multilevel surface maps
We propose a novel combination of techniques for robustly estimating the position of a mobile robot in outdoor environments using range data. Our approach applies a particle filte...
Rainer Kümmerle, Rudolph Triebel, Patrick Pfa...
ISI
2006
Springer
13 years 6 months ago
Entity Workspace: An Evidence File That Aids Memory, Inference, and Reading
An intelligence analyst often needs to keep track of more facts than can be held in human memory. As a result, analysts use a notebook or evidence file to record facts learned so f...
Eric A. Bier, Edward W. Ishak, Ed Chi