Sciweavers

334 search results - page 54 / 67
» Capturing Web Services Provider Constraints - An Algorithmic...
Sort
View
TIT
2010
131views Education» more  TIT 2010»
13 years 2 months ago
Characterization of SINR region for interfering links with constrained power
In this paper, a communication system including n interfering additive white Gaussian noise (AWGN) links is considered. Each transmitter uses a Gaussian codebook and each receiver...
Hajar Mahdavi-Doost, Masoud Ebrahimi, Amir K. Khan...
PAMI
2008
216views more  PAMI 2008»
13 years 7 months ago
Annotating Images by Mining Image Search Results
Although it has been studied for years by the computer vision and machine learning communities, image annotation is still far from practical. In this paper, we propose a novel atte...
Xin-Jing Wang, Lei Zhang 0001, Xirong Li, Wei-Ying...
IFIP
2005
Springer
14 years 1 months ago
Content-Based Image Retrieval for Digital Forensics
Digital forensic investigators are often faced with the task of manually examining a large number of (photographic) images in order to identify potential evidence. The task can be...
Yixin Chen, Vassil Roussev, Golden G. Richard III,...
BMCBI
2010
116views more  BMCBI 2010»
13 years 7 months ago
SEQADAPT: an adaptable system for the tracking, storage and analysis of high throughput sequencing experiments
Background: High throughput sequencing has become an increasingly important tool for biological research. However, the existing software systems for managing and processing these ...
David B. Burdick, Christopher C. Cavnor, Jeremy Ha...
ICDE
2009
IEEE
156views Database» more  ICDE 2009»
14 years 9 months ago
Online Anomaly Prediction for Robust Cluster Systems
In this paper, we present a stream-based mining algorithm for online anomaly prediction. Many real-world applications such as data stream analysis requires continuous cluster opera...
Xiaohui Gu, Haixun Wang