Sciweavers

1697 search results - page 331 / 340
» Spike Feature Extraction Using Informative Samples
Sort
View
WSC
2004
13 years 9 months ago
A Case Study in Meta-Simulation Design and Performance Analysis for Large-Scale Networks
Simulation and Emulation techniques are fundamental to aid the process of large-scale protocol design and network operations. However, the results from these techniques are often ...
David W. Bauer, Garrett R. Yaun, Christopher D. Ca...
JMM2
2008
82views more  JMM2 2008»
13 years 7 months ago
Typhoon Locating and Reconstruction from the Infrared Satellite Cloud Image
Typhoon inflicts terrible damage due to thunderstorms, violent winds, torrential rain, flooding and extreme high tides. Improving the early typhoon forecast capability is important...
Tsang-Long Pao, Jun-Heng Yeh
NAACL
2003
13 years 9 months ago
Implicit Trajectory Modeling through Gaussian Transition Models for Speech Recognition
It is well known that frame independence assumption is a fundamental limitation of current HMM based speech recognition systems. By treating each speech frame independently, HMMs ...
Hua Yu, Tanja Schultz
SIGMOD
2010
ACM
207views Database» more  SIGMOD 2010»
13 years 8 months ago
Leveraging spatio-temporal redundancy for RFID data cleansing
Radio Frequency Identification (RFID) technologies are used in many applications for data collection. However, raw RFID readings are usually of low quality and may contain many an...
Haiquan Chen, Wei-Shinn Ku, Haixun Wang, Min-Te Su...
BMCBI
2010
127views more  BMCBI 2010»
13 years 8 months ago
Deriving enzymatic and taxonomic signatures of metagenomes from short read data
Background: We propose a method for deriving enzymatic signatures from short read metagenomic data of unknown species. The short read data are converted to six pseudo-peptide cand...
Uri Weingart, Erez Persi, Uri Gophna, David Horn