Sciweavers

7289 search results - page 147 / 1458
» A Dependent Set Theory
Sort
View
ISBI
2002
IEEE
14 years 8 months ago
Capturing contextual dependencies in medical imagery using hierarchical multi-scale models
In this paper we summarize our results for two classes of hierarchical multi-scale models that exploit contextual information for detection of structure in mammographic imagery. T...
Paul Sajda, Clay Spence, Lucas C. Parra
TCC
2009
Springer
153views Cryptology» more  TCC 2009»
14 years 8 months ago
On the (Im)Possibility of Key Dependent Encryption
We study the possibility of constructing encryption schemes secure under messages that are chosen depending on the key k of the encryption scheme itself. We give the following sep...
Iftach Haitner, Thomas Holenstein
ICAS
2008
IEEE
145views Robotics» more  ICAS 2008»
14 years 2 months ago
Task Dependency of User Perceived Utility in Autonomic VoIP Systems
The transmission of voice-over-Internet protocol (VoIP) network traffic is used in an increasing variety of applications and settings. Many of these applications involve communic...
Edward Stehle, Maxim Shevertalov, Paul deGrandis, ...
ECML
2007
Springer
14 years 2 months ago
Weighted Kernel Regression for Predicting Changing Dependencies
Abstract. Consider the online regression problem where the dependence of the outcome yt on the signal xt changes with time. Standard regression techniques, like Ridge Regression, d...
Steven Busuttil, Yuri Kalnishkan
IDEAL
2004
Springer
14 years 1 months ago
Mobile Data Mining by Location Dependencies
Mobile mining is about finding useful knowledge from the raw data produced by mobile users. The mobile environment consists of a set of static device and mobile device. Previous wo...
Jen Ye Goh, David Taniar