Sciweavers

8154 search results - page 1616 / 1631
» Understanding changes in use cases: A case study
Sort
View
DAM
2007
131views more  DAM 2007»
13 years 7 months ago
Haplotyping with missing data via perfect path phylogenies
Computational methods for inferring haplotype information from genotype data are used in studying the association between genomic variation and medical condition. Recently, Gusfi...
Jens Gramm, Till Nierhoff, Roded Sharan, Till Tant...
INFOCOM
2010
IEEE
13 years 6 months ago
Neighbor Discovery with Reception Status Feedback to Transmitters
—Neighbor discovery is essential for the process of self-organization of a wireless network, where almost all routing and medium access protocols need knowledge of one-hop neighb...
Ramin Khalili, Dennis Goeckel, Donald F. Towsley, ...
PAMI
2010
265views more  PAMI 2010»
13 years 6 months ago
Motion Segmentation in the Presence of Outlying, Incomplete, or Corrupted Trajectories
—In this paper, we study the problem of segmenting tracked feature point trajectories of multiple moving objects in an image sequence. Using the affine camera model, this proble...
Shankar Rao, Roberto Tron, René Vidal, Yi M...
TKDE
2010
158views more  TKDE 2010»
13 years 6 months ago
Voting Systems with Trust Mechanisms in Cyberspace: Vulnerabilities and Defenses
—With the popularity of voting systems in cyberspace, there are growing evidence that the current voting systems can be manipulated by fake votes. This problem has attracted many...
Qinyuan Feng, Yan Lindsay Sun, Ling Liu, Yafei Yan...
TPDS
2010
116views more  TPDS 2010»
13 years 6 months ago
FS2You: Peer-Assisted Semipersistent Online Hosting at a Large Scale
—It has been widely acknowledged that online file hosting systems within the “cloud” of the Internet have provided valuable services to end users who wish to share files of a...
Fangming Liu, Ye Sun, Bo Li, Baochun Li, Xinyan Zh...
« Prev « First page 1616 / 1631 Last » Next »