Sciweavers

1356 search results - page 10 / 272
» Analysis of security data from a large computing organizatio...
Sort
View
CVPR
2006
IEEE
14 years 10 months ago
Vessel Crawlers: 3D Physically-based Deformable Organisms for Vasculature Segmentation and Analysis
We present a novel approach to the segmentation and analysis of vasculature from volumetric medical image data. Our method is an adoption and significant extension of deformable o...
Chris McIntosh, Ghassan Hamarneh
IDA
2011
Springer
13 years 2 months ago
A parallel, distributed algorithm for relational frequent pattern discovery from very large data sets
The amount of data produced by ubiquitous computing applications is quickly growing, due to the pervasive presence of small devices endowed with sensing, computing and communicatio...
Annalisa Appice, Michelangelo Ceci, Antonio Turi, ...
CMS
2003
148views Communications» more  CMS 2003»
13 years 9 months ago
Computation of Cryptographic Keys from Face Biometrics
We outline cryptographic key–computation from biometric data based on error-tolerant transformation of continuous-valued face eigenprojections to zero-error bitstrings suitable f...
Alwyn Goh, David Ngo Chek Ling
BMCBI
2005
152views more  BMCBI 2005»
13 years 7 months ago
GeneKeyDB: A lightweight, gene-centric, relational database to support data mining environments
Background: The analysis of biological data is greatly enhanced by existing or emerging databases. Most existing databases, with few exceptions are not designed to easily support ...
S. A. Kirov, X. Peng, E. Baker, D. Schmoyer, B. Zh...
PERCOM
2010
ACM
13 years 6 months ago
Security analysis of reliable transport layer protocols for wireless sensor networks
End-to-end reliability of communications is an important requirement in many applications of wireless sensor networks. For this reason, a number of reliable transport protocols sp...
Levente Buttyán, L. Csik