Sciweavers

1765 search results - page 254 / 353
» Combinations of Weak Classifiers
Sort
View
JCM
2007
191views more  JCM 2007»
13 years 10 months ago
Using Antenna Array Redundancy and Channel Diversity for Secure Wireless Transmissions
— The use of signal processing techniques to protect wireless transmissions is proposed as a way to secure wireless networks at the physical layer. This approach addresses a uniq...
Xiaohua Li, Juite Hwu, E. Paul Ratazzi
JTAER
2007
90views more  JTAER 2007»
13 years 10 months ago
One-size e-business adoption model does not fit all
This empirical study of organisational e-business adoption, utilising both qualitative and quantitative data collection methods, examines four major factors influencing adoption i...
Barbara Roberts, Mark Toleman
BIOINFORMATICS
2004
86views more  BIOINFORMATICS 2004»
13 years 10 months ago
Transposable element annotation of the rice genome
Motivation: The high content of repetitive sequences in the genomes of many higher eukaryotes renders the task of annotating them computationally intensive. Presently, the only wi...
Nikoleta Juretic, Thomas E. Bureau, Richard M. Bru...
TOCHI
1998
112views more  TOCHI 1998»
13 years 9 months ago
The Integrality of Speech in Multimodal Interfaces
A framework of complementary behavior has been proposed which maintains that direct manipulation and speech interfaces have reciprocal strengths and weaknesses. This suggests that...
Michael A. Grasso, David S. Ebert, Timothy W. Fini...
JUCS
2010
134views more  JUCS 2010»
13 years 8 months ago
Track-To-Track Measurement Fusion Architectures and Correlation Analysis
: The purpose of this paper is to address some theoretical issues related to the track-to-track fusion problem when the measurements tracking the same target are inherently correla...
Mourad Oussalah, Zahir Messaoudi, Abdelaziz Ouldal...