Sciweavers

450 search results - page 67 / 90
» Algorithmic uses of the Feferman-Vaught Theorem
Sort
View
BMCBI
2008
214views more  BMCBI 2008»
13 years 7 months ago
Enhanced Bayesian modelling in BAPS software for learning genetic structures of populations
Background: During the most recent decade many Bayesian statistical models and software for answering questions related to the genetic structure underlying population samples have...
Jukka Corander, Pekka Marttinen, Jukka Siré...
ICMCS
2006
IEEE
127views Multimedia» more  ICMCS 2006»
14 years 2 months ago
An Interactive Region-Based Image Clustering and Retrieval Platform
Content-based Image retrieval has become an important part of information retrieval technology. Images can be viewed as high dimensional data and are usually represented by their ...
Ying Liu, Xin Chen, Chengcui Zhang, Alan P. Spragu...
ASIAN
2006
Springer
134views Algorithms» more  ASIAN 2006»
14 years 11 days ago
Computational Soundness of Formal Indistinguishability and Static Equivalence
In the investigation of the relationship between the formal and the computational view of cryptography, a recent approach, first proposed in [10], uses static equivalence from cryp...
Gergei Bana, Payman Mohassel, Till Stegers
VMV
2001
160views Visualization» more  VMV 2001»
13 years 10 months ago
Interactive Repositioning of Bone Fracture Segments
This paper presents an application for semiautomatic repositioning of bone fractures that allows the merging of several fragments. This application has been developed with regard ...
Michael Scheuering, Christof Rezk-Salama, Christia...
CORR
2010
Springer
268views Education» more  CORR 2010»
13 years 8 months ago
Bayesian Based Comment Spam Defending Tool
Spam messes up user's inbox, consumes network resources and spread worms and viruses. Spam is flooding of unsolicited, unwanted e mail. Spam in blogs is called blog spam or c...
Dhinaharan Nagamalai, Beatrice Cynthia Dhinakaran,...