Sciweavers

370 search results - page 72 / 74
» Independent Sets with Domination Constraints
Sort
View
KBSE
1995
IEEE
13 years 11 months ago
A Transformation System for Interactive Reformulation of Design Optimization Strategies
Numerical design optimization algorithms are highly sensitive to the particular formulation of the optimization problems they are given. The formulation of the search space, the o...
Thomas Ellman, John Keane, Takahiro Murata, Mark S...
ECCV
2010
Springer
13 years 10 months ago
Recursive Coarse-to-Fine Localization for fast Object Detection
Cascading techniques are commonly used to speed-up the scan of an image for object detection. However, cascades of detectors are slow to train due to the high number of detectors a...
Marco Pedersoli, Jordi Gonzàlez, Andrew D. Bagdan...
PSB
2004
13 years 8 months ago
Multiplexing Schemes for Generic SNP Genotyping Assays
Association studies in populations relate genomic variation among individuals with medical condition. Key to these studies is the development of efficient and affordable genotypin...
Roded Sharan, Amir Ben-Dor, Zohar Yakhini
BMCBI
2006
115views more  BMCBI 2006»
13 years 7 months ago
Multivariate curve resolution of time course microarray data
Background: Modeling of gene expression data from time course experiments often involves the use of linear models such as those obtained from principal component analysis (PCA), i...
Peter D. Wentzell, Tobias K. Karakach, Sushmita Ro...
CORR
2007
Springer
114views Education» more  CORR 2007»
13 years 7 months ago
On the Throughput of Secure Hybrid-ARQ Protocols for Gaussian Block-Fading Channels
—The focus of this paper is an information-theoretic study of retransmission protocols for reliable packet communication under a secrecy constraint. The hybrid automatic retransm...
Xiaojun Tang, Ruoheng Liu, Predrag Spasojevic, H. ...