Sciweavers

320 search results - page 35 / 64
» Conditionals and consequences
Sort
View
IPPS
2010
IEEE
13 years 7 months ago
BitTorrent and fountain codes: friends or foes?
Abstract--BitTorrent is the most popular file sharing protocol on the Internet. It is proved that its performance are nearoptimal for generic file distribution when the overlay is ...
Salvatore Spoto, Rossano Gaeta, Marco Grangetto, M...
BMCBI
2007
139views more  BMCBI 2007»
13 years 10 months ago
Significance analysis of microarray transcript levels in time series experiments
Background: Microarray time series studies are essential to understand the dynamics of molecular events. In order to limit the analysis to those genes that change expression over ...
Barbara Di Camillo, Gianna Toffolo, Sreekumaran K....
COMPGEOM
2004
ACM
14 years 3 months ago
Locality-sensitive hashing scheme based on p-stable distributions
We present a novel Locality-Sensitive Hashing scheme for the Approximate Nearest Neighbor Problem under ÐÔ norm, based on Ôstable distributions. Our scheme improves the running...
Mayur Datar, Nicole Immorlica, Piotr Indyk, Vahab ...
SCAI
2008
13 years 11 months ago
Sharing Moral Responsibility with Robots: A Pragmatic Approach
Roboethics is a recently developed field of applied ethics which deals with the ethical aspects of technologies such as robots, ambient intelligence, direct neural interfaces and i...
Gordana Dodig-Crnkovic, Daniel Persson
CVPR
2004
IEEE
14 years 12 months ago
Visual Tracking Using Learned Linear Subspaces
This paper presents a simple but robust visual tracking algorithm based on representing the appearances of objects using affine warps of learned linear subspaces of the image spac...
Jeffrey Ho, Kuang-Chih Lee, Ming-Hsuan Yang, David...