Sciweavers

499 search results - page 25 / 100
» Why neighbor-joining works
Sort
View
JCS
2011
87views more  JCS 2011»
13 years 4 months ago
Practical eavesdropping and skimming attacks on high-frequency RFID tokens
RFID systems often use near-field magnetic coupling to implement communication channels. The advertised operational range of these channels is less than 10 cm and therefore sever...
Gerhard P. Hancke
PAMI
2011
13 years 4 months ago
Revisiting Linear Discriminant Techniques in Gender Recognition
—Emerging applications of computer vision and pattern recognition in mobile devices and networked computing require the development of resourcelimited algorithms. Linear classifi...
Juan Bekios-Calfa, José Miguel Buenaposada,...
JAIR
2010
147views more  JAIR 2010»
13 years 4 months ago
Cause Identification from Aviation Safety Incident Reports via Weakly Supervised Semantic Lexicon Construction
The Aviation Safety Reporting System collects voluntarily submitted reports on aviation safety incidents to facilitate research work aiming to reduce such incidents. To effectivel...
Muhammad Arshad Ul Abedin, Vincent Ng, Latifur Kha...
JMLR
2010
134views more  JMLR 2010»
13 years 4 months ago
Estimation of a Structural Vector Autoregression Model Using Non-Gaussianity
Analysis of causal effects between continuous-valued variables typically uses either autoregressive models or structural equation models with instantaneous effects. Estimation of ...
Aapo Hyvärinen, Kun Zhang, Shohei Shimizu, Pa...
SIGMETRICS
2010
ACM
129views Hardware» more  SIGMETRICS 2010»
13 years 4 months ago
From traffic matrix to routing matrix: PoP level traffic characteristics for a Tier-1 ISP
Traffic matrices play a pivotal role in the management of an ISP's network such as various levels of traffic engineering and capacity planning. However, it is unclear how the...
Vijay Kumar Adhikari, Sourabh Jain, Zhi-Li Zhang