Sciweavers

247 search results - page 13 / 50
» A New Cryptosystem Based On Hidden Order Groups
Sort
View
NN
2000
Springer
192views Neural Networks» more  NN 2000»
13 years 7 months ago
A new algorithm for learning in piecewise-linear neural networks
Piecewise-linear (PWL) neural networks are widely known for their amenability to digital implementation. This paper presents a new algorithm for learning in PWL networks consistin...
Emad Gad, Amir F. Atiya, Samir I. Shaheen, Ayman E...
DICTA
2007
13 years 8 months ago
Biometric Based Cryptographic Key Generation from Faces
Existing asymmetric encryption algorithms require the storage of the secret private key. Stored keys are often protected by poorly selected user passwords that can either be guess...
B. Chen, V. Chandran
JOC
2007
133views more  JOC 2007»
13 years 7 months ago
Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication
In the security chain the weakest link is definitely the human one: human beings cannot remember long secrets and often resort to rather insecure solutions to keep track of their ...
Dario Catalano, David Pointcheval, Thomas Pornin
BMCBI
2008
167views more  BMCBI 2008»
13 years 7 months ago
Not proper ROC curves as new tool for the analysis of differentially expressed genes in microarray experiments
Background: Most microarray experiments are carried out with the purpose of identifying genes whose expression varies in relation with specific conditions or in response to enviro...
Stefano Parodi, Vito Pistoia, Marco Muselli
GBRPR
2007
Springer
14 years 1 months ago
Grouping Using Factor Graphs: An Approach for Finding Text with a Camera Phone
Abstract. We introduce a new framework for feature grouping based on factor graphs, which are graphical models that encode interactions among arbitrary numbers of random variables....
Huiying Shen, James Coughlan