Sciweavers

761 search results - page 61 / 153
» Concise and Consistent Naming
Sort
View
INFFUS
2006
128views more  INFFUS 2006»
13 years 10 months ago
Distributed detection in a large wireless sensor network
A distributed detection and decision fusion scheme is proposed for a wireless sensor network (WSN) consisting of a large number of sensors. At the fusion center, the total number ...
Ruixin Niu, Pramod K. Varshney, Qi Cheng
JMLR
2008
110views more  JMLR 2008»
13 years 10 months ago
A Bahadur Representation of the Linear Support Vector Machine
The support vector machine has been successful in a variety of applications. Also on the theoretical front, statistical properties of the support vector machine have been studied ...
Ja-Yong Koo, Yoonkyung Lee, Yuwon Kim, Changyi Par...
JMM2
2006
141views more  JMM2 2006»
13 years 10 months ago
Optimal Weighting of Landmarks for Face Recognition
A new method named Landmark Model Matching was recently proposed for fully automatic face recognition. It was inspired by Elastic Bunch Graph Matching and Active Shape Model. Landm...
Rajinda Senaratne, Saman K. Halgamuge
ENTCS
2007
121views more  ENTCS 2007»
13 years 10 months ago
Rewrite-Based Decision Procedures
The rewrite-based approach to satisfiability modulo theories consists of using generic theorem-proving strategies for first-order logic with equality. If one can prove that an i...
Maria Paola Bonacina, Mnacho Echenim
INTR
2007
100views more  INTR 2007»
13 years 10 months ago
Web services access control architecture incorporating trust
Purpose – This paper seeks to investigate how the concept of a trust level is used in the access control policy of a web services provider in conjunction with the attributes of ...
Marijke Coetzee, Jan H. P. Eloff