Sciweavers

512 search results - page 49 / 103
» Closed-loop Robust Identification Using the Direct Approach
Sort
View
JMLR
2006
113views more  JMLR 2006»
13 years 7 months ago
On Inferring Application Protocol Behaviors in Encrypted Network Traffic
Several fundamental security mechanisms for restricting access to network resources rely on the ability of a reference monitor to inspect the contents of traffic as it traverses t...
Charles V. Wright, Fabian Monrose, Gerald M. Masso...
BMCBI
2007
166views more  BMCBI 2007»
13 years 7 months ago
Optimization of filtering criterion for SEQUEST database searching to improve proteome coverage in shotgun proteomics
Background: In proteomic analysis, MS/MS spectra acquired by mass spectrometer are assigned to peptides by database searching algorithms such as SEQUEST. The assignations of pepti...
Xinning Jiang, Xiaogang Jiang, Guanghui Han, Mingl...
CAGD
2007
119views more  CAGD 2007»
13 years 7 months ago
Principal curvatures from the integral invariant viewpoint
The extraction of curvature information for surfaces is a basic problem of Geometry Processing. Recently an integral invariant solution of this problem was presented, which is bas...
Helmut Pottmann, Johannes Wallner, Yong-Liang Yang...
ICPR
2000
IEEE
14 years 1 days ago
Eye Activity Detection and Recognition Using Morphological Scale-Space Decomposition
Automatic recovery of eye gestures from image sequences is one of the important topics for face recognition and model-based coding of videophone sequences. Usually complicated mod...
Ilse Ravyse, Hichem Sahli, Jan Cornelis, Marcel J....
PAM
2009
Springer
14 years 2 months ago
Access Point Localization Using Local Signal Strength Gradient
Abstract. Many previous studies have examined the placement of access points (APs) to improve the community’s understanding of the deployment and behavioral characteristics of wi...
Dongsu Han, David G. Andersen, Michael Kaminsky, K...