Sciweavers

1933 search results - page 354 / 387
» Improved Algorithms for the Feedback Vertex Set Problems
Sort
View
WISA
2004
Springer
14 years 27 days ago
Encrypted Watermarks and Linux Laptop Security
The most common way to implement full-disk encryption (as opposed to encrypted file systems) in the GNU/Linux operating system is using the encrypted loop device, known as CryptoL...
Markku-Juhani Olavi Saarinen
ICRA
2003
IEEE
103views Robotics» more  ICRA 2003»
14 years 25 days ago
Simultaneous localization and mapping with unknown data association using fastSLAM
— The Extended Kalman Filter (EKF) has been the de facto approach to the Simultaneous Localization and Mapping (SLAM) problem for nearly fifteen years. However, the EKF has two ...
Michael Montemerlo, Sebastian Thrun
SIGMOD
1999
ACM
101views Database» more  SIGMOD 1999»
13 years 12 months ago
Join Synopses for Approximate Query Answering
In large data warehousing environments, it is often advantageous to provide fast, approximate answers to complex aggregate queries based on statistical summaries of the full data....
Swarup Acharya, Phillip B. Gibbons, Viswanath Poos...
CLUSTER
2004
IEEE
13 years 11 months ago
Towards provision of quality of service guarantees in job scheduling
Considerable research has focused on the problem of scheduling dynamically arriving independent parallel jobs on a given set of resources. There has also been some recent work in ...
Mohammad Islam, Pavan Balaji, P. Sadayappan, Dhaba...
GCB
2000
Springer
137views Biometrics» more  GCB 2000»
13 years 11 months ago
Detecting Sporadic Recombination in DNA Alignments with Hidden Markov Models
Conventional phylogenetic tree estimation methods assume that all sites in a DNA multiple alignment have the same evolutionary history. This assumption is violated in data sets fro...
Dirk Husmeier, Frank Wright