Sciweavers

1153 search results - page 207 / 231
» An Automatic Feature Based Face Authentication System,
Sort
View
BMCBI
2008
134views more  BMCBI 2008»
13 years 8 months ago
Identification of transcription factor contexts in literature using machine learning approaches
Background: Availability of information about transcription factors (TFs) is crucial for genome biology, as TFs play a central role in the regulation of gene expression. While man...
Hui Yang, Goran Nenadic, John A. Keane
CRV
2009
IEEE
217views Robotics» more  CRV 2009»
14 years 3 months ago
Probabilistic 3D Tracking: Rollator Users' Leg Pose from Coronal Images
Understanding the human gait is an important objective towards improving elderly mobility. In turn, gait analyses largely depend on kinematic and dynamic measurements. While the m...
Samantha Ng, Adel H. Fakih, Adam Fourney, Pascal P...
CISC
2005
Springer
109views Cryptology» more  CISC 2005»
14 years 2 months ago
Enforcing Email Addresses Privacy Using Tokens
We propose a system which allows users to monitor how their email addresses are used and how they spread over the Internet. This protects the privacy of the user and can reduce the...
Roman Schlegel, Serge Vaudenay
USENIX
2004
13 years 10 months ago
REX: Secure, Extensible Remote Execution
The ubiquitous SSH package has demonstrated the importance of secure remote login and execution. As remote execution tools grow in popularity, users require new features and exten...
Michael Kaminsky, Eric Peterson, Daniel B. Giffin,...
VTC
2010
IEEE
158views Communications» more  VTC 2010»
13 years 7 months ago
QoS and Flow Management for Future Multi-Hop Mobile Radio Networks
Abstract— Mobile radio networks of the IMT-Advanced systems family promise ubiquitous broadband access and high area coverage, with rates of several 100 MBit/s. They claim to gua...
Rainer Schoenen, Arif Otyakmaz