Sciweavers

292 search results - page 40 / 59
» Exploiting Dead Value Information
Sort
View
WASA
2009
Springer
107views Algorithms» more  WASA 2009»
14 years 2 months ago
Relative Span Weighted Localization of Uncooperative Nodes in Wireless Networks
Abstract. Increasingly ubiquitous wireless technologies require novel localization techniques to pinpoint the position of an uncooperative node, whether the target be a malicious d...
Christine Laurendeau, Michel Barbeau
ICB
2009
Springer
202views Biometrics» more  ICB 2009»
14 years 2 months ago
Beyond Minutiae: A Fingerprint Individuality Model with Pattern, Ridge and Pore Features
Abstract. Fingerprints are considered to be unique because they contain various distinctive features, including minutiae, ridges, pores, etc. Some attempts have been made to model ...
Yi Chen, Anil K. Jain
INCDM
2009
Springer
96views Data Mining» more  INCDM 2009»
14 years 2 months ago
Ordinal Evaluation: A New Perspective on Country Images
We present a novel use of ordinal evaluation (OrdEval) algorithm as a promising technique to study various marketing phenomena. OrdEval algorithm has originated in data mining and ...
Marko Robnik-Sikonja, Kris Brijs, Koen Vanhoof
AIPR
2008
IEEE
14 years 2 months ago
Temporal structure methods for image-based change analysis
– This paper addresses the exploitation of massive numbers of image-derived change detections. We use the term “change analysis” to emphasize the intelligence value obtained ...
Ray Rimey, Dan Keefe
GLOBECOM
2008
IEEE
14 years 1 months ago
Optimized Opportunistic Multicast Scheduling over Cellular Networks
—The design of optimal opportunistic multicast scheduling (OMS) that maximizes the throughput of cellular networks is investigated. In a cellular network, the base station (BS) t...
Tze-Ping Low, Man-On Pun, C. C. Jay Kuo