Sciweavers

501 search results - page 79 / 101
» Redundancy and Diversity in Security
Sort
View
IJRR
2007
236views more  IJRR 2007»
13 years 7 months ago
Towards High-resolution Imaging from Underwater Vehicles
Large area mapping at high resolution underwater continues to be constrained by sensor-level environmental constraints and the mismatch between available navigation and sensor acc...
Hanumant Singh, Christopher N. Roman, Oscar Pizarr...
IEEEMM
2002
134views more  IEEEMM 2002»
13 years 7 months ago
A Middleware Architecture for Open and Interoperable GISs
an abstract model for information sharing and integration and use it to develop an architecture for building open, component-based, interoperable systems. A geographic information ...
Steven H. Wong, Steven L. Swartz, Dilip Sarkar
SIGIR
2002
ACM
13 years 7 months ago
Risk minimization and language modeling in text retrieval dissertation abstract
tion Abstract ChengXiang Zhai (Advisor: John Lafferty) Language Technologies Institute School of Computer Science Carnegie Mellon University With the dramatic increase in online in...
ChengXiang Zhai
BMCBI
2010
110views more  BMCBI 2010»
13 years 6 months ago
Improvements to previous algorithms to predict gene structure and isoform concentrations using Affymetrix Exon arrays
Background: Exon arrays provide a way to measure the expression of different isoforms of genes in an organism. Most of the procedures to deal with these arrays are focused on gene...
Miguel A. Anton, Ander Aramburu, Angel Rubio
KDD
2010
ACM
272views Data Mining» more  KDD 2010»
13 years 6 months ago
Scalable similarity search with optimized kernel hashing
Scalable similarity search is the core of many large scale learning or data mining applications. Recently, many research results demonstrate that one promising approach is creatin...
Junfeng He, Wei Liu, Shih-Fu Chang