Sciweavers

15351 search results - page 2708 / 3071
» The information bottleneck method
Sort
View
IJSNET
2007
91views more  IJSNET 2007»
15 years 4 months ago
SUMP: a secure unicast messaging protocol for wireless ad hoc sensor networks
: Most wireless ad hoc sensor networks are susceptible to routing level attacks, in which an adversary masquerades as a legitimate node to convince neighbouring nodes that it is th...
Jeff Janies, Chin-Tser Huang, Nathan L. Johnson, T...
ARTMED
2005
87views more  ARTMED 2005»
15 years 4 months ago
Fuzzy attributes of a DNA complex: Development of a fuzzy inference engine for codon-"junk" codon delineation
Codons refer to those parts in a DNA complex encoded towards forming a desired set of proteins. Also coexist in the DNA are noncodons (or "junk" codons) whose functions ...
Tomás Arredondo Vidal, Perambur S. Neelakan...
158
Voted
IPM
2007
158views more  IPM 2007»
15 years 4 months ago
Validation and interpretation of Web users' sessions clusters
Understanding users’ navigation on the Web is important towards improving the quality of information and the speed of accessing large-scale Web data sources. Clustering of users...
George Pallis, Lefteris Angelis, Athena Vakali
TFS
2008
174views more  TFS 2008»
15 years 4 months ago
Type-2 Fuzzy Markov Random Fields and Their Application to Handwritten Chinese Character Recognition
In this paper, we integrate type-2 (T2) fuzzy sets with Markov random fields (MRFs) referred to as T2 FMRFs, which may handle both fuzziness and randomness in the structural patter...
Jia Zeng, Zhi-Qiang Liu
TIP
2008
344views more  TIP 2008»
15 years 4 months ago
A Self-Organizing Approach to Background Subtraction for Visual Surveillance Applications
Detection of moving objects in video streams is the first relevant step of information extraction in many computer vision applications. Aside from the intrinsic usefulness of being...
Lucia Maddalena, Alfredo Petrosino
« Prev « First page 2708 / 3071 Last » Next »