CiteWeb

WorldWeb citation database

Computer Science

Page 6
A Real-Time QRS Detection Algorithm

We have developed a real-time algorithm for detection of the QRS complexes of ECG signals. It reliably recognizes QRS complexes based upon digital analyses of slope, amplitude, and width. A special digital bandpass filter reduces false detections caused...

Distributed snapshots: determining global states of distributed systems

This paper presents an algorithm by which a process in a distributed system determines a global state of the system during a computation. Many problems in distributed systems can be cast in terms of the problem of detecting global states. For instance,...

An introduction to biometric recognition

A wide variety of systems requires reliable personal recognition schemes to either confirm or determine the identity of an individual requesting their services. The purpose of such schemes is to ensure that the rendered services are accessed only by a...

Local polynomial modelling and its applications

Data-analytic approaches to regression problems, arising from many scientific disciplines are described in this book. The aim of these nonparametric methods is to relax assumptions on the form of a regression function and to let data search for a suitable...

Techniques for data hiding

Walter Bender, Daniel Gruhl, Norishige Morimoto, Aiguo Lu

Search and clustering orders of magnitude faster than BLAST

Motivation: Biological sequence data is accumulating rapidly, motivating the development of improved high-throughput methods for sequence classification.Results: UBLAST and USEARCH are new algorithms enabling sensitive local and global search of large...

Introduction to Space-Time Wireless Communications

Wireless networks are under constant pressure to provide ever-higher data rates to increasing numbers of users with greater reliability. This book is an accessible introduction to every fundamental aspect of space-time wireless communications. Space-time...

The Definition of Standard ML

From the Publisher:Standard ML is general-purpose programming language designed for large projects. This book provides a formal definition of Standard ML for the benefit of all concerned with the language, including users and implementers. Because computer...

A Fast and Elitist Multi-Objective Genetic Algorithm: NSGA-II

Kalyanmoy Deb, Amrit Pratap, Sameer Agarwal, T. Meyarivan

Principles of distributed database systems

This third edition of a classic textbook can be used to teach at the senior undergraduate and graduate levels. The material concentrates on fundamental theories as well as techniques and algorithms. The advent of the Internet and the World Wide Web, and,...

Approximation algorithms

This book will be of interest to the scientific community at large and, in particular, to students and researchers in Computer Science, Operation Research, and Discrete Mathematics. It can be used both as a text in a graduate course on approximation algorithms...

Random Data: Analysis and Measurement Procedures

From the Publisher:A revised and expanded edition of this classic reference/text, covering the latest techniques for the analysis and measurement of stationary and nonstationary random data passing through physical systems. With more than 100,000 copies...

The cascade-correlation learning architecture

Scott E. Fahlman, Christian Lebiere

The Art of Software Testing

The classic, landmark work on software testingThe hardware and software of computing have changed markedly in the three decades since the first edition of The Art of Software Testing, but this book's powerful underlying analysis has stood the test of...

Feature selection based on mutual information criteria of max-dependency, max-relevance, and min-redundancy

Feature selection is an important problem for pattern classification systems. We study how to select good features according to the maximal statistical dependency criterion based on mutual information. Because of the difficulty in directly implementing...

Self-Recovering Equalization and Carrier Tracking in Two-Dimensional Data Communication Systems

Conventional equalization and carrier recovery algorithms for minimizing mean-square error in digital communication systems generally require an initial training period during which a known data sequence is transmitted and properly synchronized at the...

SIP: Session Initiation Protocol

This document describes Session Initiation Protocol (SIP), an\napplication-layer control (signaling) protocol for creating,\nmodifying, and terminating sessions with one or more participants.\nThese sessions include Internet telephone calls, multimedia\ndistribution,...

A global optimisation method for robust affine registration of brain images

Registration is an important component of medical image analysis and for analysing large amounts of data it is desirable to have fully automatic registration methods. Many different automatic registration methods have been proposed to date, and almost...

Logical relations in Chinese and the theory of grammar

Thesis (Ph.D.)--Massachusetts Institute of Technology, Dept. of Linguistics and Philosophy, 1982.

Light field rendering

Marc Levoy, Pat Hanrahan

A universal image quality index

We propose a new universal objective image quality index, which is easy to calculate and applicable to various image processing applications. Instead of using traditional error summation methods, the proposed index is designed by modeling any image distortion...

Heuristics: intelligent search strategies for computer problem solving

Heuristics: intelligent search strategies for computer problem solving

A Fast Iterative Shrinkage-Thresholding Algorithm for Linear Inverse Problems

We consider the class of iterative shrinkage-thresholding algorithms (ISTA) for solving linear inverse problems arising in signal/image processing. This class of methods, which can be viewed as an extension of the classical gradient algorithm, is attractive...

SMOTE: synthetic minority over-sampling technique

An approach to the construction of classifiers from imbalanced datasets is described. A dataset is imbalanced if the classification categories are not approximately equally represented. Often real-world data sets are predominately composed of "normal"...

A FAST ELITIST NON-DOMINATED SORTING GENETIC ALGORITHM FOR MULTI-OBJECTIVE OPTIMIZATION: NSGA-II

Multi-objective evolutionary algorithms which use non-dominated sorting and sharing have been mainly criticized for their (i) O(MN 3 ) computational complexity (where M is the number of objectives and N is the population size), (ii) non-elitism approach,...

Practical Issues in Structural Modeling

Practical problems that are frequently encountered in applications of covariance structure analysis are discussed and solutions are suggested. Conceptual, statistical, and practical requirements for structural modeling are reviewed to indicate how basic...

Elementary Numerical Analysis: An Algorithmic Approach

From the Publisher:Intended for introductory courses in numerical analysis,this book features a comprehensive treatment of major topics in this subject area. Using an algorithmic approach,it provides numerous worked examples with computer output,and flowcharts...

Interaction design : beyond human-computer interaction

Accomplished authors, Preece, Rogers and Sharp, have written a key new textbook on this core subject area. Interaction Design deals with a broad scope of issues, topics and paradigms that has traditionally been the scope of Human-Computer Interaction...

Virtual time

Virtual time is a new paradigm for organizing and synchronizing distributed systems which can be applied to such problems as distributed discrete event simulation and distributed database concurrency control. Virtual time provides a flexible abstraction...

Graph structure in the Web

The study of the Web as a graph is not only fascinating in its own right, but also yields valuable insight into Web algorithms for crawling, searching and community discovery, and the sociological phenomena which characterize its evolution. We report...

Hypertext Transfer Protocol -- HTTP/1.1

The Hypertext Transfer Protocol (HTTP) is an application-level protocol with the lightness and speed necessary for distributed, collaborative, hypermedia information systems. It is a generic, stateless, object-oriented protocol which can be used for many...

Cryptography: Theory and Practice

From the Publisher:The object of the book is to produce a general, comprehensive textbook that treats all the essential core areas of cryptography.

NEW TABLES FOR MULTIPLE COMPARISONS WITH A CONTROL

Some time ago, a multiple comparison procedure for comparing several treatments simultaneously with a control or standard treatment was introduced by the present author (Dunnett [1955]). The procedure was designed to be used either to test the significance...

Geography-informed energy conservation for Ad Hoc routing

We introduce a geographical adaptive fidelity (GAF) algorithm that reduces energy consumption in ad hoc wireless networks. GAF conserves energy by identifying nodes that are equivalent from a routing perspective and then turning off unnecessary nodes,...

Display of surfaces from volume data

The application of volume-rendering techniques to the display of surfaces from sampled scalar functions of three spatial dimensions is discussed. It is not necessary to fit geometric primitives to the sampled data; images are formed by directly shading...

Business Process Management

Barbara Pernici, Mathias Weske

Workflow Patterns

Differences in features supported by the various contemporary commercial workflow management systems point to different insights of suitability and different levels of expressive power. The challenge, which we undertake in this paper, is to systematically...

Developing and Validating Trust Measures for e-Commerce: An Integrative Typology

Evidence suggests that consumers often hesitate to transact with Web-based vendors because of uncertainty about vendor behavior or the perceived risk of having personal information stolen by hackers. Trust plays a central role in helping consumers overcome...

Comparing images using the Hausdorff distance

The Hausdorff distance measures the extent to which each point of a model set lies near some point of an image set and vice versa. Thus, this distance can be used to determine the degree of resemblance between two objects that are superimposed on one...

Graph structure in the web

The study of the web as a graph is not only fascinating in its own right, but also yields valuable insight into web algorithms for crawling, searching and community discovery, and the sociological phenomena which characterize its evolution. We report...

Stability of networked control systems

First, we review some previous work on networked control systems (NCSs) and offer some improvements. Then, we summarize the fundamental issues in NCSs and examine them with different underlying network-scheduling protocols. We present NCS models with...

Versatile low power media access for wireless sensor networks

We propose B-MAC , a carrier sense media access protocol for wireless sensor networks that provides a flexible interface to obtain ultra low power operation, effective collision avoidance, and high channel utilization. To achieve low power operation,...

Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer

A digital computer is generally believed to be an efficient universal computing device; that is, it is believed able to simulate any physical computing device with an increase in computation time by at most a polynomial factor. This may not be true when...

Cryptography and Network Security: Principles and Practice

William Stallings' Cryptography and Network Security: Principles and Practice, 5e is a practical survey of cryptography and network security with unmatched support for instructors and students. In this age of universal electronic connectivity, viruses...

The random subspace method for constructing decision forests

Much of previous attention on decision trees focuses on the splitting criteria and optimization of tree sizes. The dilemma between overfitting and achieving maximum accuracy is seldom resolved. A method to construct a decision tree based classifier is...

A machine program for theorem-proving

The programming of a proof procedure is discussed in connection with trial runs and possible improvements.

How iris recognition works

Algorithms developed by the author for recognizing persons by their iris patterns have now been tested in many field and laboratory trials, producing no false matches in several million comparison tests. The recognition principle is the failure of a test...

A tutorial on visual servo control

This article provides a tutorial introduction to visual servo control of robotic manipulators. Since the topic spans many disciplines our goal is limited to providing a basic conceptual framework. We begin by reviewing the prerequisite topics from robotics...

Service-oriented computing: concepts, characteristics and directions

Service-oriented computing (SOC) is the computing paradigm that utilizes services as fundamental elements for developing applications/solutions. To build the service model, SOC relies on the service oriented architecture (SOA), which is a way of reorganizing...

W/sup 4/: real-time surveillance of people and their activities

W/sup 4/ is a real time visual surveillance system for detecting and tracking multiple people and monitoring their activities in an outdoor environment. It operates on monocular gray-scale video imagery, or on video imagery from an infrared camera. W/sup...

Public-key cryptosystems based on composite degree residuosity classes

This paper investigates a novel computational problem, namely the Composite Residuosity Class Problem, and its applications to public-key cryptography. We propose a new trapdoor mechanism and derive from this technique three encryption schemes : a trapdoor...

Numerical Methods for Engineers

The fifth edition of Numerical Methods for Engineers continues its tradition of excellence. Instructors love this text because it is a comprehensive text that is easy to teach from. Students love it because it is written for them--with great pedagogy...

Artificial Neural Networks

From the Publisher:This new text has been designed to present the concepts of artificial neural networks in a concise and logical manner for your computer engineering students.

THE CASE FOR CASE.

Charles J. Fillmore

The handbook of brain theory and neural networks

From the Publisher:Dramatically updating and extending the first edition, published in 1995, the second edition of The Handbook of Brain Theory and Neural Networks presents the enormous progress made in recent years in the many subfields related to the...

A conceptual framework and a toolkit for supporting the rapid prototyping of context-aware applications

Computing devices and applications are now used beyond the desktop, in diverse environments, and this trend toward ubiquitous computing is accelerating. One challenge that remains in this emerging research field is the ability to enhance the behavior...

Comparison of parametric representations for monosyllabic word recognition in continuously spoken sentences

Several parametric representations of the acoustic signal were compared with regard to word recognition performance in a syllable-oriented continuous speech recognition system. The vocabulary included many phonetically similar monosyllabic words, therefore...

Interactive graph cuts for optimal boundary & region segmentation of objects in N-D images

In this paper we describe a new technique for general purpose interactive segmentation of N-dimensional images. The user marks certain pixels as "object" or "background" to provide hard constraints for segmentation. Additional soft constraints incorporate...

Probabilistic roadmaps for path planning in high-dimensional configuration spaces

A new motion planning method for robots in static workspaces is presented. This method proceeds in two phases: a learning phase and a query phase. In the learning phase, a probabilistic roadmap is constructed and stored as a graph whose nodes correspond...

On the Optimality of the Simple Bayesian Classifier under Zero-One Loss

The simple Bayesian classifier is known to be optimal when attributes are independent given the class, but the question of whether other sufficient conditions for its optimality exist has so far not been explored. Empirical results showing that it performs...

Graph drawing by force-directed placement

SUMMARY We present a modiflcation of the spring-embedder model of Eades 1 for drawing general undirected graphs with straight edges. Our heuristic strives for uniform edge lengths,andwedevelopitinanalogytoforcesinnaturalsystems,forasimple,elegant, conceptually{intuitive,...

An introduction to kernel-based learning algorithms

This paper provides an introduction to support vector machines, kernel Fisher discriminant analysis, and kernel principal component analysis, as examples for successful kernel-based learning methods. We first give a short background about Vapnik-Chervonenkis...

Human and machine recognition of faces: a survey

The goal of this paper is to present a critical survey of existing literature on human and machine recognition of faces. Machine recognition of faces has several applications, ranging from static matching of controlled photographs as in mug shots matching...

Securing ad hoc networks

Ad hoc networks are a new wireless networking paradigm for mobile hosts. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, hosts rely on each other to keep the network connected. Military tactical...

Orthogonal least squares learning algorithm for radial basis function networks

The radial basis function network offers a viable alternative to the two-layer neural network in many applications of signal processing. A common learning algorithm for radial basis function networks is based on first choosing randomly some data points...

Computer Methods for Mathematical Computations

George E. Forsythe, Michael A. Malcolm

The Semantic Web: Research and Applications

Lora Aroyo, Grigoris Antoniou, Eero Hyvönen, Annette ten Teije, Heiner Stuckenschmidt, Liliana Cabral, Tania Tudorache

Dynamic Programming and Stochastic Control

Dimitri P. Bertsekas, Chelsea C. White

Connectivism: A Learning Theory for the Digital Age

International Journal of Instructional Technology and Distance Learning (ITDL), January 2005

Ensemble Methods in Machine Learning

Ensemble methods are learning algorithms that construct a set of classifiers and then classify new data points by taking a (weighted) vote of their predictions. The original ensemble method is Bayesian averaging, but more recent algorithms include error-correcting...

An overview of statistical learning theory

Statistical learning theory was introduced in the late 1960's. Until the 1990's it was a purely theoretical analysis of the problem of function estimation from a given collection of data. In the middle of the 1990's new types of learning algorithms (called...

A fast fixed-point algorithm for independent component analysis

We introduce a novel fast algorithm for independent component analysis, which can be used for blind source separation and feature extraction. We show how a neural network learning rule can be transformed into a fixedpoint iteration, which provides an...

Improved Boosting Algorithms Using Confidence-rated Predictions

We describe several improvements to Freund and Schapire‘s AdaBoost boosting algorithm, particularly in a setting in which hypotheses may assign confidences to each of their predictions. We give a simplified analysis of AdaBoost in this setting, and...

Adaptive mixtures of local experts

We present a new supervised learning procedure for systems composed of many separate networks, each of which learns to handle a subset of the complete set of training cases. The new procedure can be viewed either as a modular version of a multilayer supervised...

Overview of the Scalable Video Coding Extension of the H.264/AVC Standard

With the introduction of the H.264/AVC video coding standard, significant improvements have recently been demonstrated in video compression capability. The Joint Video Team of the ITU-T VCEG and the ISO/IEC MPEG has now also standardized a Scalable Video...

Secure routing in wireless sensor networks: attacks and countermeasures

We consider routing security in wireless sensor networks. Many sensor network routing protocols have been proposed, but none of them have been designed with security as a goal. We propose security goals for routing in sensor networks, show how attacks...

Privacy-preserving data mining

A fruitful direction for future data mining research will be the development of techniques that incorporate privacy concerns. Specifically, we address the following question. Since the primary task in data mining is the development of models about aggregated...

Statistical Methods for Survival Data Analysis

Statistical Methods for Survival Data Analysis

Optimizing search engines using clickthrough data

This paper presents an approach to automatically optimizing the retrieval quality of search engines using clickthrough data. Intuitively, a good information retrieval system should present relevant documents high in the ranking, with less relevant documents...

Range-free localization schemes for large scale sensor networks

Wireless Sensor Networks have been proposed for a multitude of location-dependent applications. For such systems, the cost and limitations of the hardware on sensing nodes prevent the use of range-based localization schemes that depend on absolute point-to-point...

Generative programming: methods, tools, and applications

Krzysztof Czarnecki, Ulrich W. Eisenecker

Compression of individual sequences via variable-rate coding

Compressibility of individual sequences by the class of generalized finite-state information-lossless encoders is investigated. These encoders can operate in a variable-rate mode as well as a fixed-rate one, and they allow for any finite-state scheme...

Mobility increases the capacity of ad-hoc wireless networks

The capacity of ad-hoc wireless networks is constrained by the mutual interference of concurrent transmissions between nodes. We study a model of an ad-hoc network where n nodes communicate in random source-destination pairs. These nodes are assumed to...

High confidence visual recognition of persons by a test of statistical independence

A method for rapid visual recognition of personal identity is described, based on the failure of a statistical test of independence. The most unique phenotypic feature visible in a person's face is the detailed texture of each eye's iris. The visible...

Distributed Optimization and Statistical Learning via the Alternating Direction Method of Multipliers

Many problems of recent interest in statistics and machine learning can be posed in the framework of convex optimization. Due to the explosion in size and complexity of modern datasets, it is increasingly important to be able to solve problems with a...

Medium access control with coordinated adaptive sleeping for wireless sensor networks

This paper proposes S-MAC, a medium access control (MAC) protocol designed for wireless sensor networks. Wireless sensor networks use battery-operated computing and sensing devices. A network of these devices will collaborate for a common application...

Transaction Processing: Concepts and Techniques

From the Publisher:The key to client/server computing.Transaction processing techniques are deeply ingrained in the fields of databases and operating systems and are used to monitor, control and update information in modern computer systems. This book...

A fast quantum mechanical algorithm for database search

: Imagine a phone directory containing N names arranged in completely random order. In order to find someone's phone number with a 50% probability, any classical algorithm (whether deterministic or probabilistic) will need to look at a minimum of N/2...

The On-Line Encyclopedia of Integer Sequences

The On-Line Encyclopedia of Integer Sequences (or OEIS) is a database of some 130000 number sequences. It is freely available on the Web (http://www.research.att.com/~njas/sequences/) and is widely used.There are several ways in which it benefits research:...

Consensus seeking in multiagent systems under dynamically changing interaction topologies

This note considers the problem of information consensus among multiple agents in the presence of limited and unreliable information exchange with dynamically changing interaction topologies. Both discrete and continuous update schemes are proposed for...

Mobility increases the capacity of ad hoc wireless networks

The capacity of ad hoc wireless networks is constrained by the mutual interference of concurrent transmissions between nodes. We study a model of an ad hoc network where n nodes communicate in random source-destination pairs. These nodes are assumed to...

Some computer science issues in ubiquitous computing

Some computer science issues in ubiquitous computing

The design and use of steerable filters

The authors present an efficient architecture to synthesize filters of arbitrary orientations from linear combinations of basis filters, allowing one to adaptively steer a filter to any orientation, and to determine analytically the filter output as a...

Locality Preserving Projections

Xiaofei He, Partha Niyogi

Theory and Application of Digital Signal Processing

L. R. Rabiner, Bernard Gold, C.K. Yuen

Information theory, inference, and learning algorithms

Fun and exciting textbook on the mathematics underpinning the most dynamic areas of modern science and engineering.

Computer visualization of three-dimensional image data using IMOD.

We have developed a computer software package, IMOD, as a tool for analyzing and viewing three-dimensional biological image data. IMOD is useful for studying and modeling data from tomographic, serial section, and optical section reconstructions. The...

A systematic comparison of various statistical alignment models

We present and compare various methods for computing word alignments using statistical or heuristic models. We consider the five alignment models presented in Brown, Della Pietra, Della Pietra, and Mercer (1993), the hidden Markov alignment model, smoothing...

Protein identification and analysis tools in the ExPASy server.

Protein identification and analysis software performs a central role in the investigation of proteins from two-dimensional (2-D) gels and mass spectrometry. For protein identification, the user matches certain empirically acquired information against...

Face recognition: features versus templates

Two new algorithms for computer recognition of human faces, one based on the computation of a set of geometrical features, such as nose width and length, mouth position, and chin shape, and the second based on almost-gray-level template matching, are...

Principles of data mining

The growing interest in data mining is motivated by a common problem across disciplines: how does one store, access, model, and ultimately describe and understand very large data sets? Historically, different aspects of data mining have been addressed...

Two-dimensional PCA: a new approach to appearance-based face representation and recognition

In this paper, a new technique coined two-dimensional principal component analysis (2DPCA) is developed for image representation. As opposed to PCA, 2DPCA is based on 2D image matrices rather than 1D vectors so the image matrix does not need to be transformed...

From few to many: illumination cone models for face recognition under variable lighting and pose

We present a generative appearance-based method for recognizing human faces under variation in lighting and viewpoint. Our method exploits the fact that the set of images of an object in fixed pose, but under all possible illumination conditions, is a...

Self-similarity in World Wide Web traffic: evidence and possible causes

The notion of self-similarity has been shown to apply to wide-area and local-area network traffic. We show evidence that the subset of network traffic that is due to World Wide Web (WWW) transfers can show characteristics that are consistent with self-similarity,...

Neural network ensembles

Several means for improving the performance and training of neural networks for classification are proposed. Crossvalidation is used as a tool for optimizing network parameters and architecture. It is shown that the remaining residual generalization error...

The Mythical Man-Month

The book, The Mythical Man-Month, Addison-Wesley, 1975 (excerpted in Datamation, December 1974), gathers some of the published data about software engineering and mixes it with the assertion of a lot of personal opinions. In this presentation, the author...

How iris recognition works

The principle that underlies the recognition of persons by their iris patterns is the failure of a test of statistical independence on texture phase structure as encoded by multiscale quadrature wavelets. The combinatorial complexity of this phase information...

« Prev. Next »
First ... 1 2 3 4 5 6 7 8 9 10 11 ... Last

© 2016-2018 CiteWeb.info — WorldWeb citation database

Up ↑