Sciweavers

2763 search results - page 515 / 553
» The Dangerous 'All' in Specifications
Sort
View
IVC
2006
120views more  IVC 2006»
13 years 10 months ago
Face recognition by fusing thermal infrared and visible imagery
Thermal infrared (IR) imagery offers a promising alternative to visible imagery for face recognition due to its relative insensitive to variations in face appearance caused by ill...
George Bebis, Aglika Gyaourova, Saurabh Singh, Ioa...
JNCA
2008
86views more  JNCA 2008»
13 years 10 months ago
Performance comparisons of load balancing algorithms for I/O-intensive workloads on clusters
Load balancing techniques play a critically important role in developing high-performance cluster computing platforms. Existing load balancing approaches are concerned with the ef...
Xiao Qin
JAIR
2006
134views more  JAIR 2006»
13 years 10 months ago
Multi-Issue Negotiation with Deadlines
This paper studies bilateral multi-issue negotiation between self-interested autonomous agents. Now, there are a number of different procedures that can be used for this process; ...
S. Shaheen Fatima, Michael Wooldridge, Nicholas R....
JCB
2006
114views more  JCB 2006»
13 years 10 months ago
A General Modeling Strategy for Gene Regulatory Networks with Stochastic Dynamics
A stochastic genetic toggle switch model that consists of two identical, mutually repressive genes is built using the Gillespie algorithm with time delays as an example of a simpl...
Andre Ribeiro, Rui Zhu, Stuart A. Kauffman
JSAC
2008
118views more  JSAC 2008»
13 years 10 months ago
PEEC: a channel-adaptive feedback-based error
Reliable transmission is a challenging task over wireless LANs since wireless links are known to be susceptible to errors. Although the current IEEE802.11 standard ARQ error contro...
Sohraab Soltani, Hayder Radha