Sciweavers

8780 search results - page 1682 / 1756
» On the Feasibility of Consistent Computations
Sort
View
GECCO
2007
Springer
211views Optimization» more  GECCO 2007»
14 years 5 months ago
An extremal optimization search method for the protein folding problem: the go-model example
The protein folding problem consists of predicting the functional (native) structure of the protein given its linear sequence of amino acids. Despite extensive progress made in un...
Alena Shmygelska
IPOM
2007
Springer
14 years 5 months ago
Measurement and Analysis of Intraflow Performance Characteristics of Wireless Traffic
It is by now widely accepted that the arrival process of aggregate network traffic exhibits self-similar characteristics which result in the preservation of traffic burstiness (hig...
Dimitrios P. Pezaros, Manolis Sifalakis, David Hut...
IPSN
2007
Springer
14 years 5 months ago
The regiment macroprogramming system
The development of high-level programming environments is essential if wireless sensor networks are to be accessible to nonexperts. In this paper, we present the Regiment system, ...
Ryan Newton, Greg Morrisett, Matt Welsh
PSIVT
2007
Springer
239views Multimedia» more  PSIVT 2007»
14 years 5 months ago
People Counting in Low Density Video Sequences
This paper presents a novel approach for automatic people counting in videos captured through a conventional closed-circuit television (CCTV) using computer vision techniques. The ...
Jaime Dalla Valle, Luiz E. Soares de Oliveira, Ale...
VLDB
2007
ACM
295views Database» more  VLDB 2007»
14 years 5 months ago
From Data Privacy to Location Privacy: Models and Algorithms
This tutorial presents the definition, the models and the techniques of location privacy from the data privacy perspective. By reviewing and revising the state of art research in ...
Ling Liu
« Prev « First page 1682 / 1756 Last » Next »