Sciweavers

1933 search results - page 354 / 387
» Improved Algorithms for the Feedback Vertex Set Problems
Sort
View
126
Voted
WISA
2004
Springer
15 years 9 months ago
Encrypted Watermarks and Linux Laptop Security
The most common way to implement full-disk encryption (as opposed to encrypted file systems) in the GNU/Linux operating system is using the encrypted loop device, known as CryptoL...
Markku-Juhani Olavi Saarinen
139
Voted
ICRA
2003
IEEE
103views Robotics» more  ICRA 2003»
15 years 8 months ago
Simultaneous localization and mapping with unknown data association using fastSLAM
— The Extended Kalman Filter (EKF) has been the de facto approach to the Simultaneous Localization and Mapping (SLAM) problem for nearly fifteen years. However, the EKF has two ...
Michael Montemerlo, Sebastian Thrun
124
Voted
SIGMOD
1999
ACM
101views Database» more  SIGMOD 1999»
15 years 7 months ago
Join Synopses for Approximate Query Answering
In large data warehousing environments, it is often advantageous to provide fast, approximate answers to complex aggregate queries based on statistical summaries of the full data....
Swarup Acharya, Phillip B. Gibbons, Viswanath Poos...
107
Voted
CLUSTER
2004
IEEE
15 years 7 months ago
Towards provision of quality of service guarantees in job scheduling
Considerable research has focused on the problem of scheduling dynamically arriving independent parallel jobs on a given set of resources. There has also been some recent work in ...
Mohammad Islam, Pavan Balaji, P. Sadayappan, Dhaba...
146
Voted
GCB
2000
Springer
137views Biometrics» more  GCB 2000»
15 years 7 months ago
Detecting Sporadic Recombination in DNA Alignments with Hidden Markov Models
Conventional phylogenetic tree estimation methods assume that all sites in a DNA multiple alignment have the same evolutionary history. This assumption is violated in data sets fro...
Dirk Husmeier, Frank Wright