CiteWeb

WorldWeb citation database

Computer Science

Page 2
Maintaining knowledge about temporal intervals

We have described a system for reasoning about temporal intervals that is both expressive and computationally effective. The representation captures the temporal hierarchy implicit in many domains by using a hierarchy of reference intervals, which precisely...

WordNet: a lexical database for English

Because meaningful sentences are composed of meaningful words, any system that hopes to process natural languages as people do must have information about words and their meanings. This information is traditionally provided through dictionaries, and machine-readable...

A scalable content-addressable network

Hash tables - which map "keys" onto "values" - are an essential building block in modern software systems. We believe a similar functionality would be equally valuable to large distributed systems. In this paper, we introduce the concept of a Content-Addressable...

Modern Control Engineering

From the Publisher:This comprehensive treatment of the analysis and design of continuous-time control systems provides a gradual development of control theory—and shows how to solve all computational problems with MATLAB. It avoids highly mathematical...

An algorithm for suffix stripping

The automatic removal of suffixes from words in English is of particular interest in the field of information retrieval. An algorithm for suffix stripping is described, which has been implemented as a short, fast program in BCPL. Although simple, it performs...

PAST: PALEONTOLOGICAL STATISTICAL SOFTWARE PACKAGE FOR EDUCATION AND DATA ANALYSIS

A comprehensive, but simple-to-use software package for executing a range of standard numerical analysis and operations used in quantitative paleontology has been developed. The program, called PAST (PAleontological STatistics), runs on standard Windows...

LISREL 7 : user's reference guide

K. G. Jöreskog, Dag Sörbom

A flexible new technique for camera calibration

We propose a flexible technique to easily calibrate a camera. It only requires the camera to observe a planar pattern shown at a few (at least two) different orientations. Either the camera or the planar pattern can be freely moved. The motion need not...

Structural equation modeling with Mplus: Basic concepts, applications, and programming

Psychology is a science that advances by leaps and bounds. The impulse of new mathematical models along with the incorporation of computers to research has drawn a new reality with many methodological progresses that only a few people could imagine not...

An application-specific protocol architecture for wireless microsensor networks

Networking together hundreds or thousands of cheap microsensor nodes allows users to accurately monitor a remote environment by intelligently combining the data from the individual nodes. These networks require robust wireless communication protocols...

Linear Systems

From the Publisher:Designed for the graduate-level course,Linear Systems is thorough in both its depth and breadth of coverage. This text provides an introduction to systems theory with an emphasis on control theory. Its strong foundation in analysis...

Organizational behavior

Course Technology ILT manuals facilitate your learning by providing structured interaction with the software itself. It provides text to explain difficult concepts, the hands-on activities are the focus of our courses. The basic approach of setting expectations,...

Coordination of groups of mobile autonomous agents using nearest neighbor rules

Vicsek et al. proposed (1995) a simple but compelling discrete-time model of n autonomous agents {i.e., points or particles} all moving in the plane with the same speed but with different headings. Each agent's heading is updated using a local rule based...

Aspect-Oriented Programming

Lodewijk Bergmans, Cristina Videira Lopes

Brownian motion and stochastic calculus

Ioannis Karatzas, Steven E. Shreve

Review: Knowledge management and knowledge management systems: conceptual foundations and research issues

Knowledge is a broad and abstract notion that has defined epistemological debate in western philosophy since the classical Greek era. In the past few years, however, there has been a growing interest in treating knowledge as a significant organizational...

Understanding Information Technology Usage: A Test of Competing Models

The Technology Acceptance Model and two variations of the Theory of Planned Behavior were compared to assess which model best helps to understand usage of information technology. The models were compared using student data collected from 786 potential...

Computer-aided verification

Theorem proving and model checking are powerful tools that can verify the logical correctness of today's ICs or find their hidden bugs. Today, the first computer-aided verification tools are becoming commercially available. They are based on methods that...

The capacity of wireless networks

When n identical randomly located nodes, each capable of transmitting at W bits per second and using a fixed range, form a wireless network, the throughput /spl lambda/(n) obtainable by each node for a randomly chosen destination is /spl Theta/(W//spl...

RAxML-VI-HPC: maximum likelihood-based phylogenetic analyses with thousands of taxa and mixed models

Summary: RAxML-VI-HPC (randomized axelerated maximum likelihood for high performance computing) is a sequential and parallel program for inference of large phylogenies with maximum likelihood (ML). Low-level technical optimizations, a modification of...

Neural network design

This book, by the authors of the Neural Network Toolbox for MATLAB, provides a clear and detailed coverage of fundamental neural network architectures and learning rules. In it, the authors emphasize a coherent presentation of the principal neural networks,...

Computational geometry: an introduction

From the reviews: "This book offers a coherent treatment, at the graduate textbook level, of the field that has come to be known in the last decade or so as computational geometry. ... ... The book is well organized and lucidly written; a timely contribution...

Congestion avoidance and control

In October of '86, the Internet had the first of what became a series of 'congestion collapses'. During this period, the data throughput from LBL to UC Berkeley (sites separated by 400 yards and three IMP hops) dropped from 32 Kbps to 40 bps. Mike Karels...

Cognitive radio: making software radios more personal

Software radios are emerging as platforms for multiband multimode personal communications systems. Radio etiquette is the set of RF bands, air interfaces, protocols, and spatial and temporal patterns that moderate the use of the radio spectrum. Cognitive...

A tutorial on particle filters for online nonlinear/non-Gaussian Bayesian tracking

Increasingly, for many application areas, it is becoming important to include elements of nonlinearity and non-Gaussianity in order to model accurately the underlying dynamics of a physical system. Moreover, it is typically crucial to process data on-line...

The self-organizing map

The self-organized map, an architecture suggested for artificial neural networks, is explained by presenting simulation experiments and practical applications. The self-organizing map has the property of effectively creating spatially organized internal...

Quantum mechanics and path integrals

This emended edition of the original 1965 publication corrects hundreds of typographical errors and recasts many equations for clearer comprehension.

The description logic handbook: theory, implementation, and applications

Description logics are embodied in several knowledge-based systems and are used to develop various real-life applications. Now in paperback, The Description Logic Handbook provides a thorough account of the subject, covering all aspects of research in...

Refactoring: Improving the Design of Existing Code

Almost every expert in Object-Oriented Development stresses the importance of iterative development. As you proceed with the iterative development, you need to add function to the existing code base. If you are really lucky that code base is structured...

Handbook of genetic algorithms

This book sets out to explain what genetic algorithms are and how they can be used to solve real-world problems. The first objective is tackled by the editor, Lawrence Davis. The remainder of the book is turned over to a series of short review articles...

SIP: Session Initiation Protocol

This document describes Session Initiation Protocol (SIP), an application-layer control (signaling) protocol for creating, modifying, and terminating sessions with one or more participants. These sessions include Internet telephone calls, multimedia distribution,...

Space-time codes for high data rate wireless communication: performance criterion and code construction

We consider the design of channel codes for improving the data rate and/or the reliability of communications over fading channels using multiple transmit antennas. Data is encoded by a channel code and the encoded data is split into n streams that are...

Component software: beyond object-oriented programming

With the advent of new enabling technologies, the need for the information put forth in this new edition is greater than ever. Component Software, Second Edition explains what the key software component technologies are, how to use them properly, and...

Simulation Modeling and Analysis

From the Publisher:This senior/graduate-level text is the classic text in its field and established itself as the authoritative source on the theory & practice of simulation over 15 years ago. It is used in most of the better schools of engineering and...

Term-weighting approaches in automatic text retrieval

The experimental evidence accumulated over the past 20 years indicates that text indexing systems based on the assignment of appropriately weighted single terms produce retrieval results that are superior to those obtainable with other more elaborate...

An Algorithm for Vector Quantizer Design

An efficient and intuitive algorithm is presented for the design of vector quantizers based either on a known probabilistic model or on a long training sequence of data. The basic properties of the algorithm are discussed and demonstrated by examples....

RADAR: an in-building RF-based user location and tracking system

The proliferation of mobile computing devices and local-area wireless networks has fostered a growing interest in location-aware systems and services. In this paper we present RADAR, a radio-frequency (RF)-based system for locating and tracking users...

Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers

An ad-hoc network is the cooperative engagement of a collection of Mobile Hosts without the required intervention of any centralized Access Point. In this paper we present an innovative design for the operation of such ad-hoc networks. The basic idea...

Speeded-Up Robust Features (SURF)

This article presents a novel scale- and rotation-invariant detector and descriptor, coined SURF (Speeded-Up Robust Features). SURF approximates or even outperforms previously proposed schemes with respect to repeatability, distinctiveness, and robustness,...

Independent component analysis, a new concept?

The independent component analysis (ICA) of a random vector consists of searching for a linear transformation that minimizes the statistical dependence between its components. In order to define suitable search criteria, the expansion of mutual information...

An introduction to ROC analysis

Receiver operating characteristics (ROC) graphs are useful for organizing classifiers and visualizing their performance. ROC graphs are commonly used in medical decision making, and in recent years have been used increasingly in machine learning and data...

Performance analysis of the IEEE 802.11 distributed coordination function

The IEEE has standardized the 802.11 protocol for wireless local area networks. The primary medium access control (MAC) technique of 802.11 is called the distributed coordination function (DCF). The DCF is a carrier sense multiple access with collision...

GPSR: greedy perimeter stateless routing for wireless networks

We present Greedy Perimeter Stateless Routing (GPSR), a novel routing protocol for wireless datagram networks that uses the positions of routers and a packet's destination to make packet forwarding decisions. GPSR makes greedy forwarding decisions...

A relational model of data for large shared data banks

Future users of large data banks must be protected from having to know how the data is organized in the machine (the internal representation). A prompting service which supplies such information is not a satisfactory solution. Activities of users at terminals...

The Unified Modeling Language user guide

In The Unified Modeling Language User Guide, the original developers of the UML--Grady Booch, James Rumbaugh, and Ivar Jacobson--provide a tutorial to the core aspects of the language in a two-color format designed to facilitate learning. Starting with...

An introduction to variable and feature selection

Variable and feature selection have become the focus of much research in areas of application for which datasets with tens or hundreds of thousands of variables are available. These areas include text processing of internet documents, gene expression...

A public key cryptosystem and a signature scheme based on discrete logarithms

A new signature scheme is proposed, together with an implementation of the Diffie-Hellman key distribution scheme that achieves a public key cryptosystem. The security of both systems relies on the difficulty of computing discrete logarithms over finite...

Neuro-fuzzy and soft computing; a computational approach to learning and machine intelligence

Included in Prentice Hall's MATLAB Curriculum Series, this text provides a comprehensive treatment of the methodologies underlying neuro-fuzzy and soft computing. The book places equal emphasis on theoretical aspects of covered methodologies, empirical...

Aspect-oriented programming

The concept of a general purpose aspect is introduced where an aspect transparently forces cross-cutting behavior on object classes and other software entities. A reusable aspect is further described for use as part of an aspect library.

From Data Mining to Knowledge Discovery in Databases

■ Data mining and knowledge discovery in databases have been attracting a significant amount of research, industry, and media attention of late. What is all the excitement about? This article provides an overview of this emerging field, clarifying how...

Outline of a New Approach to the Analysis of Complex Systems and Decision Processes

The approach described in this paper represents a substantive departure from the conventional quantitative techniques of system analysis. It has three main distinguishing features: 1) use of so-called ``linguistic'' variables in place of or in addition...

Least squares quantization in PCM

It has long been realized that in pulse-code modulation (PCM), with a given ensemble of signals to handle, the quantum values should be spaced more closely in the voltage regions where the signal amplitude is more likely to fall. It has been shown by...

Machine learning in automated text categorization

The automated categorization (or classification) of texts into predefined categories has witnessed a booming interest in the last 10 years, due to the increased availability of documents in digital form and the ensuing need to organize them. In the research...

The language of new media

Manovich theorises on the emergence of the computer as a new medium used for web sites, digital imagery and multi-media projects. He draws upon histories of art, photography, video, cinema, telecommunications and design in his analysis of new media and...

Statecharts: A visual formalism for complex systems

We present a broad extension of the conventional formalism of state machines and state diagrams, that is relevant to the specification and design of complex discrete-event systems, such as multi-computer real-time systems, communication protocols and...

Xen and the art of virtualization

Numerous systems have been designed which use virtualization to subdivide the ample resources of a modern computer. Some require specialized hardware, or cannot support commodity operating systems. Some target 100% binary compatibility at the expense...

Multiresolution gray-scale and rotation invariant texture classification with local binary patterns

Presents a theoretically very simple, yet efficient, multiresolution approach to gray-scale and rotation invariant texture classification based on local binary patterns and nonparametric discrimination of sample and prototype distributions. The method...

Matching pursuits with time-frequency dictionaries

The authors introduce an algorithm, called matching pursuit, that decomposes any signal into a linear expansion of waveforms that are selected from a redundant dictionary of functions. These waveforms are chosen in order to best match the signal structures....

Good features to track

No feature-based vision system can work unless good features can be identified and tracked from frame to frame. Although tracking itself is by and large a solved problem, selecting features that can be tracked well and correspond to physical points in...

Identification and control of dynamical systems using neural networks

It is demonstrated that neural networks can be used effectively for the identification and control of nonlinear dynamical systems. The emphasis is on models for both identification and control. Static and dynamic backpropagation methods for the adjustment...

Foundations of Logic Programming

Foundations of Logic Programming

Modern Applied Statistics with S

A guide to using S environments to perform statistical analyses providing both an introduction to the use of S and a course in modern statistical methods. The emphasis is on presenting practical problems and full analyses of real data sets.

Toward the next generation of recommender systems: a survey of the state-of-the-art and possible extensions

This paper presents an overview of the field of recommender systems and describes the current generation of recommendation methods that are usually classified into the following three main categories: content-based, collaborative, and hybrid recommendation...

Sequential Monte Carlo methods in practice

Monte Carlo methods are revolutionizing the on-line analysis of data in fields as diverse as financial modeling, target tracking and computer vision. These methods, appearing under the names of bootstrap filters, condensation, optimal Monte Carlo filters,...

Overview of the H.264/AVC video coding standard

H.264/AVC is newest video coding standard of the ITU-T Video Coding Experts Group and the ISO/IEC Moving Picture Experts Group. The main goals of the H.264/AVC standardization effort have been enhanced compression performance and provision of a "network-friendly"...

Directed diffusion: a scalable and robust communication paradigm for sensor networks

Advances in processor, memory and radio technology will enable small and cheap nodes capable of sensing, communication and computation. Networks of such nodes can coordinate to perform distributed sensing of environmental phenomena. In this paper, we...

Ant colony system: a cooperative learning approach to the traveling salesman problem

This paper introduces the ant colony system (ACS), a distributed algorithm that is applied to the traveling salesman problem (TSP). In the ACS, a set of cooperating agents called ants cooperate to find good solutions to TSPs. Ants cooperate using an indirect...

Experiments with a New Boosting Algorithm

In an earlier paper, we introduced a new "boosting" algorithm called AdaBoost which, theoretically, can be used to significantly reduce the error of any learning algorithm that con- sistently generates classifiers whose performance is a little better...

Monte Carlo Statistical Methods

We have sold 4300 copies worldwide of the first edition (1999). This new edition contains five completely new chapters covering new developments.

Statistical Inference

From the Publisher:Unified treatment of probability and statistics examines and analyzes the relationship between the two fields, exploring inferential issues. Numerous problems, examples, and diagrams--some with solutions--plus clear-cut, highlighted...

Network information flow

R. Ahlswede, Ning Cai, S.-Y.R. Li, R.W. Yeung

Space-time block codes from orthogonal designs

We introduce space-time block coding, a new paradigm for communication over Rayleigh fading channels using multiple transmit antennas. Data is encoded using a space-time block code and the encoded data is split into n streams which are simultaneously...

Chord: a scalable peer-to-peer lookup protocol for Internet applications

A fundamental problem that confronts peer-to-peer applications is the efficient location of the node that stores a desired data item. This paper presents Chord, a distributed lookup protocol that addresses this problem. Chord provides support for just...

The particle swarm - explosion, stability, and convergence in a multidimensional complex space

The particle swarm is an algorithm for finding optimal regions of complex search spaces through the interaction of individuals in a population of particles. This paper analyzes a particle's trajectory as it moves in discrete time (the algebraic view),...

The complexity of theorem-proving procedures

It is shown that any recognition problem solved by a polynomial time-bounded nondeterministic Turing machine can be “reduced” to the problem of determining whether a given propositional formula is a tautology. Here “reduced” means, roughly speaking,...

A training algorithm for optimal margin classifiers

A training algorithm that maximizes the margin between the training patterns and the decision boundary is presented. The technique is applicable to a wide variety of the classification functions, including Perceptrons, polynomials, and Radial Basis Functions....

R-trees: a dynamic index structure for spatial searching

In order to handle spatial data efficiently, as required in computer aided design and geo-data applications, a database system needs an index mechanism that will help it retrieve data items quickly according to their spatial locations However, traditional...

Making large scale SVM learning practical

Training a support vector machine SVM leads to a quadratic optimization problem with bound constraints and one linear equality constraint. Despite the fact that this type of problem is well understood, there are many issues to be considered in designing...

Adaptive background mixture models for real-time tracking

A common method for real-time segmentation of moving regions in image sequences involves "background subtraction", or thresholding the error between an estimate of the image without moving objects and the current image. The numerous approaches to this...

A model of saliency-based visual attention for rapid scene analysis

A visual attention system, inspired by the behavior and the neuronal architecture of the early primate visual system, is presented. Multiscale image features are combined into a single topographical saliency map. A dynamical neural network then selects...

Exploration, normalization, and summaries of high density oligonucleotide array probe level data

some familiar features of the perfect match and mismatch probe (PM and MM) values of these data, and examine the variance‐mean relationship with probe-level data from probes believed to be defective, and so delivering noise only. We explain why we need...

Toward the next generation of recommender systems: a survey of the state-of-the-art and possible extensions

This paper presents an overview of the field of recommender systems and describes the current generation of recommendation methods that are usually classified into the following three main categories: content-based, collaborative, and hybrid recommendation...

Good features to track

Jianbo Shi, C. Toamsi

Communicating sequential processes

Communicating sequential processes

A performance evaluation of local descriptors

In this paper we compare the performance of interest point descriptors. Many different descriptors have been proposed in the literature. However, it is unclear which descriptors are more appropriate and how their performance depends on the interest point...

Mining frequent patterns without candidate generation

Mining frequent patterns in transaction databases, time-series databases, and many other kinds of databases has been studied popularly in data mining research. Most of the previous studies adopt an Apriori-like candidate set generation-and-test approach....

Advances in knowledge discovery and data mining

Usama Fayyad, Gregory Piatetsky-Shapiro, Padhraic Smyth, Ramasamy Uthurusamy

Secure spread spectrum watermarking for multimedia

This paper presents a secure (tamper-resistant) algorithm for watermarking images, and a methodology for digital watermarking that may be generalized to audio, video, and multimedia data. We advocate that a watermark should be constructed as an independent...

Active shape models—their training and application

Model-based vision is firmly established as a robust approach to recognizing and locating known rigid objects in the presence of noise, clutter, and occlusion. It is more problematic to apply model-based methods to images of objects whose appearance can...

DnaSP v5

Motivation: DnaSP is a software package for a comprehensive analysis of DNA polymorphism data. Version 5 implements a number of new features and analytical methods allowing extensive DNA polymorphism analyses on large datasets. Among other features, the...

A new, fast, and efficient image codec based on set partitioning in hierarchical trees

Embedded zerotree wavelet (EZW) coding, introduced by Shapiro (see IEEE Trans. Signal Processing, vol.41, no.12, p.3445, 1993), is a very effective and computationally simple technique for image compression. We offer an alternative explanation of the...

Designing the User Interface: Strategies for Effective Human-Computer Interaction

The much-anticipated fifth edition of Designing the User Interface provides a comprehensive, authoritative introduction to the dynamic field of human-computer interaction (HCI). Students and professionals learn practical principles and guidelines needed...

DIGITAL COMMUNICATION OVER FADING CHANNELS

noncoherent communication systems, as well as a large variety of fading channel models typical of communication links often found in the real world, including single- and multichannel reception with a large variety of types. The book gives many numerical...

Face recognition: A literature survey

As one of the most successful applications of image analysis and understanding, face recognition has recently received significant attention, especially during the past several years. At least two reasons account for this trend: the first is the wide...

Toward principles for the design of ontologies used for knowledge sharing

Recent work in Artificial Intelligence is exploring the use of formal ontologies as a way of specifying content-specific agreements for the sharing and reuse of knowledge among software entities. We take an engineering perspective on the development of...

A theory of timed automata

Alur, R. and D.L. Dill, A theory of timed automata, Theoretical Computer Science 126 (1994) 183-235. We propose timed (j&e) automata to model the behavior of real-time systems over time. Our definition provides a simple, and yet powerful, way to annotate...

SURF: speeded up robust features

In this paper, we present a novel scale- and rotation-invariant interest point detector and descriptor, coined SURF (Speeded Up Robust Features). It approximates or even outperforms previously proposed schemes with respect to repeatability, distinctiveness,...

A performance evaluation of local descriptors

In this paper, we compare the performance of descriptors computed for local interest regions, as, for example, extracted by the Harris-Affine detector [Mikolajczyk, K and Schmid, C, 2004]. Many different descriptors have been proposed in the literature....

A method for registration of 3-D shapes

The authors describe a general-purpose, representation-independent method for the accurate and computationally efficient registration of 3-D shapes including free-form curves and surfaces. The method handles the full six degrees of freedom and is based...

A view of cloud computing

Clearing the clouds away from the true potential and obstacles posed by this computing capability.

An Experiment in Linguistic Synthesis with a Fuzzy Logic Controller

This paper describes an experiment on the “linguistic” synthesis of a controller for a model industrial plant (a steam engine). Fuzzy logic is used to convert heuristic control rules stated by a human operator into an automatic control strategy. The...

Pattern Recognition and Neural Networks

This book uses tools from statistical decision theory and computational learning theory to create a rigorous foundation for the theory of neural networks. On the theoretical side, Pattern Recognition and Neural Networks emphasizes probability and statistics....

Adaptive Control

From the Publisher:Written by two of the pioneers in the field, this book contains a wealth of practical information unavailable anywhere else. The authors give a comprehensive presentation of the field of adaptive control, carefully bending theory and...

Training feedforward networks with the Marquardt algorithm

The Marquardt algorithm for nonlinear least squares is presented and is incorporated into the backpropagation algorithm for training feedforward neural networks. The algorithm is tested on several function approximation problems, and is compared with...

User cooperation diversity. Part I. System description

Mobile users' data rate and quality of service are limited by the fact that, within the duration of any given call, they experience severe variations in signal attenuation, thereby necessitating the use of some type of diversity. In this two-part paper,...

Identity-Based Encryption from the Weil Pairing

We propose a fully functional identity-based encryption scheme (IBE). The scheme has chosen ciphertext security in the random oracle model assuming an elliptic curve variant of the computational Diffie-Hellman problem. Our system is based on the Weil...

Multivariable Feedback Control: Analysis and Design

From the Publisher:This is a book on practical feedback control and not on system theory in general. Feedback is used in control systems to change the dynamics of the system and to reduce the sensitivity of the system to both signal and model uncertainty....

Field Computation by Moment Methods

From the Publisher:"An IEEE reprinting of this classic 1968 edition, FIELD COMPUTATION BY MOMENT METHODS is the first book to explore the computation of electromagnetic fields by the most popular method for the numerical solution to electromagnetic field...

Abstract interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints

A program denotes computations in some universe of objects. Abstract interpretation of programs consists in using that denotation to describe computations in another universe of abstract objects, so that the results of abstract execution give some information...

Automata, Languages and Programming

Susanne Albers, Alberto Marchetti-Spaccamela, Yossi Matias, Sotiris Nikoletseas, Wolfgang Thomas

The Laplacian Pyramid as a Compact Image Code

We describe a technique for image encoding in which local operators of many scales but identical shape serve as the basis functions. The representation differs from established techniques in that the code elements are localized in spatial frequency as...

Multiuser Detection

From the Publisher:The development of multiuser detection techniques is one of the most important recent advances in communications technology. This self-contained and comprehensive book sets out the basic details of multiuser detection, starting with...

A Vector Space Model for Automatic Indexing

In a document retieval, or other pattern matching environment where stored entities (documents) are compared with each other, or with incoming patterns (search requests), it appears that the best indexing (property) space is one where each entity lies...

« Prev. Next »
First ... 1 2 3 4 5 6 7 ... Last

© 2016-2017 CiteWeb.info — WorldWeb citation database

Up ↑