Results 1 - 10
of
112
Discovering similar multidimensional trajectories
- In ICDE
, 2002
"... We investigate techniques for analysis and retrieval of object trajectories in a two or three dimensional space. Such kind of data usually contain a great amount of noise, that makes all previously used metrics fail. Therefore, here we formalize non-metric similarity functions based on the Longest C ..."
Abstract
-
Cited by 260 (6 self)
- Add to MetaCart
We investigate techniques for analysis and retrieval of object trajectories in a two or three dimensional space. Such kind of data usually contain a great amount of noise, that makes all previously used metrics fail. Therefore, here we formalize non-metric similarity functions based on the Longest
Robust Similarity Measures for Mobile Object Trajectories
- Proc. of DEXA Workshops
, 2002
"... We investigate techniques for similarity analysis of spatio-temporal trajectories for mobile objects. Such kind of data may contain a great amount of outliers, which degrades the performance of Euclidean and Time Warping Distance. Therefore, here we propose the use of non-metric distance functions b ..."
Abstract
-
Cited by 31 (1 self)
- Add to MetaCart
We investigate techniques for similarity analysis of spatio-temporal trajectories for mobile objects. Such kind of data may contain a great amount of outliers, which degrades the performance of Euclidean and Time Warping Distance. Therefore, here we propose the use of non-metric distance functions
Magnet: Robust and Efficient Collection through Control and Data Plane Integration
"... Despite being a core networking primitive, collection protocols today often suffer from poor reliability (e.g., 70%) in practice, and heavily used protocols have never been evaluated in terms of communication efficiency. Using detailed experimental studies, we describe three challenges that cause ex ..."
Abstract
- Add to MetaCart
existing collection protocols to have poor reliability and waste energy: inaccuracies in link estimation, link dynamics, and transient loops. In this paper we present Magnet, a robust, efficient, and hardware-independent collection protocol. Magnet uses three novel techniques to address these challenges
Dynamics of proteins predicted by molecular dynamics simulations and analytical apporoaches :application to alpha-amylase inhibitor
- PROTEINS: Structure, Function, and Genetics
"... ABSTRACT The dynamics of a-amylase inhibi-tors has been investigated using molecular dynam-ics (MD) simulations and two analytical approaches, the Gaussian network model (GNM) and anisotropic network model (ANM). MD simulations use a full atomic approach with empirical force fields, while the analyt ..."
Abstract
-
Cited by 59 (8 self)
- Add to MetaCart
the analytical approaches are based on a coarse-grained single-site-per-residue model with a single-parameter harmonic potential between sufficiently close (r < 7 Å) residue pairs. The major difference between the GNM and the ANM is that no direc-tional preferences can be obtained in the GNM, all residue
IAC-08-C1.2.5 A FAST SECOND-ORDER ALGORITHM FOR PRELIMINARY DESIGN OF LOW-THRUST TRAJECTORIES
"... Solar system exploration missions require demanding propulsion capabilities. From that point of view, low-thrust technology is increasingly considered since it uses propellant more efficiently. However, the optimization of the resulting trajectories is usually difficult and time consuming. In this p ..."
Abstract
- Add to MetaCart
. In this paper, we develop a fast algorithm for preliminary design of low-thrust trajectories for spacecraft in a near Keplerian environment. The method achieves order of magnitude speed improvements at the expense of a minor accuracy reduction in the model fidelity. The approach is based on differential dynamic
Simulations on Consumer Tests: A Systematic Evaluation Approach in an Industrial Case Study
"... Abstract—Context: Consumer tests for vehicles have long a tradition of almost two decades in Europe to assess vehicular safety abilities. For active safety systems like an emergency braking guard, different consumer-test-organizations (CTOs) around the world intensify now the challenges for automoti ..."
Abstract
- Add to MetaCart
parameters will affect the brake time-points in each test case as well as the residual velocity in case of a collision with a target vehicle. Method: A formal model using a graph-based representation of the allowed variances based on relevant time-points allows the selection of relevant trajectories as test
Analytical Evaluation of a Hybrid Chaotic Shift Keying [CS-QCSK] in a CDMA System
"... In recent years, various chaos based modulation schemes were evolved, of which the CS-DCSK modulation technique provides a better BER performance and bandwidth efficiency, due to its code domain approach[10]. The QCSK modulation technique provides double benefit, namely: higher data rate with simila ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
In recent years, various chaos based modulation schemes were evolved, of which the CS-DCSK modulation technique provides a better BER performance and bandwidth efficiency, due to its code domain approach[10]. The QCSK modulation technique provides double benefit, namely: higher data rate
Modeling the hemodynamic response function in fMRI: efficiency, bias and mis-modeling. Neuroimage
, 2009
"... Most brain research to date have focused on studying the amplitude of evoked fMRI responses, though there has recently been an increased interest in measuring onset, peak latency and duration of the responses as well. A number of modeling procedures provide measures of the latency and duration of f ..."
Abstract
-
Cited by 34 (4 self)
- Add to MetaCart
(e.g., the gamma based models and IL), and hence estimates of H, T and W can be derived analytically. A lack of closed form solution (e.g., for FIR models) does not preclude estimating values from the fitted HRFs, and procedures for doing so are described in Section B of the Appendix. However, when
Prediction of near likely nodes in data-centric mobile wireless networks
- in Proceedings of the IEEE Military Communications Conference (MILCOM ’09
, 2009
"... As the increasing amount ofdata is collected in mobile wireless networks for emerging pervasive applications, data-centric storage provides energy-efficient data dissemination and organization. One ofthe approaches in datacentric storage is that the nodes that collected data will transfer their data ..."
Abstract
-
Cited by 1 (1 self)
- Add to MetaCart
their data to other neighboring nodes that store the similar type of data. However, when the nodes are mobile, type-based data distribution alone cannot provide robust data storage and retrieval, since the nodes that store similar types may move far away and can not be easily reachable in the future
1 Mean-Squared Error Beamforming for Signal Estimation: A Competitive Approach
"... Beamforming is a classical method of processing temporal sensor array measure-ments for signal estimation, interference cancellation, source direction, and spectrum estimation. It has ubiquitously been applied in areas such as radar, sonar, wire-less communications, speech processing, and medical im ..."
Abstract
- Add to MetaCart
Beamforming is a classical method of processing temporal sensor array measure-ments for signal estimation, interference cancellation, source direction, and spectrum estimation. It has ubiquitously been applied in areas such as radar, sonar, wire-less communications, speech processing, and medical
Results 1 - 10
of
112