Sciweavers

1329 search results - page 181 / 266
» Phantom faces for face analysis
Sort
View
INFOCOM
1997
IEEE
14 years 1 months ago
Analysis of Queueing Displacement Using Switch Port Speedup
Current high-speed packet switching systems, ATM in particular, have large port bu ering requirements. The use of highly integrated ASIC technology for implementing high-degree an...
Israel Cidon, Asad Khamisy, Moshe Sidi
BMCBI
2005
154views more  BMCBI 2005»
13 years 9 months ago
GObar: A Gene Ontology based analysis and visualization tool for gene sets
Background: Microarray experiments, as well as other genomic analyses, often result in large gene sets containing up to several hundred genes. The biological significance of such ...
Jason S. M. Lee, Gurpreet Katari, Ravi Sachidanand...
AIM
2002
13 years 9 months ago
Computational Vulnerability Analysis for Information Survivability
The Infrastructure of modern society is controlled by software systems. These systems are vulnerable to attacks; several such attacks, launched by "recreation hackers" h...
Howard E. Shrobe
TON
2010
189views more  TON 2010»
13 years 3 months ago
Analysis, Simulation, and Implementation of VCP: A Wireless Profiling
Abstract--Every congestion control protocol operating in wireless networks is potentially faced with two major challenges of performance degradation. These sources are (a) the coup...
Xiaolong Li, Homayoun Yousefi'zadeh
CVPR
2003
IEEE
14 years 11 months ago
Generalized Principal Component Analysis (GPCA)
This paper presents an algebro-geometric solution to the problem of segmenting an unknown number of subspaces of unknown and varying dimensions from sample data points. We represen...
René Vidal, Shankar Sastry, Yi Ma