This paper proposes a method to compute the likelihood function for the amplitudes and phase shifts of noisily observed phase-locked and amplitude-constrained sinusoids. The sinus...
Christoph Reller, Hans-Andrea Loeliger, Stefano Ma...
In this paper, we propose an ICA(Indepdendent Component Analysis) based face recognition algorithm, which is robust to illumination and pose variation. Generally, it is well known...
Tae-Kyun Kim, Hyunwoo Kim, Wonjun Hwang, Seok-Cheo...
The paradigm of Ubiquitous computing seeks to build a computing environment that responds to user context. An ideal file system for the Ubiquitous environment is one that can succ...
Online peer-to-peer (P2P) lending organizations enable an individual to obtain an unsecured loan from a collection of individuals without the participation of a bank. Previous res...
Background: In general, the construction of trees is based on sequence alignments. This procedure, however, leads to loss of informationwhen parts of sequence alignments (for inst...
Gilles Didier, Laurent Debomy, Maude Pupin, Ming Z...