Sciweavers

993 search results - page 170 / 199
» Set Constraints on Regular Terms
Sort
View
DOLAP
2010
ACM
13 years 7 months ago
Using ontologies to discover fact IDs
Object identification is a crucial step in most information systems. Nowadays, we have many different ways to identify entities such as surrogates, keys and object identifiers. Ho...
Alberto Abelló, Oscar Romero
BCB
2010
138views Bioinformatics» more  BCB 2010»
13 years 5 months ago
Comparative analysis of biclustering algorithms
Biclustering is a very popular method to identify hidden co-regulation patterns among genes. There are numerous biclustering algorithms designed to undertake this challenging task...
Doruk Bozdag, Ashwin S. Kumar, Ümit V. &Ccedi...
EJWCN
2010
118views more  EJWCN 2010»
13 years 4 months ago
Field Division Routing
Multi-hop communication objectives and constraints impose a set of challenging requirements that create difficult conditions for simultaneous optimization of features such as scala...
Milenko Drinic, Darko Kirovski, Lin Yuan, Gang Qu,...
TASLP
2010
82views more  TASLP 2010»
13 years 4 months ago
Psychoacoustically Constrained and Distortion Minimized Speech Enhancement
Abstract--This paper considers a psychoacoustically constrained and distortion minimized speech enhancement algorithm. Noise reduction, in general, leads to speech distortion, and ...
Seokhwan Jo, Chang D. Yoo
CVPR
2011
IEEE
13 years 1 months ago
How does Person Identity Recognition Help Multi-Person Tracking?
We address the problem of multi-person tracking in a complex scene from a single camera. Although trackletassociation methods have shown impressive results in several challenging ...
Cheng-Hao Kuo, Ram Nevatia