Sciweavers

12264 search results - page 2194 / 2453
» Analysis of the rubberband algorithm
Sort
View
AUSDM
2008
Springer
237views Data Mining» more  AUSDM 2008»
15 years 6 months ago
On Inconsistencies in Quantifying Strength of Community Structures
Complex network analysis involves the study of the properties of various real world networks. In this broad field, research on community structures forms an important sub area. Th...
Wen Haw Chong
BIOID
2008
157views Biometrics» more  BIOID 2008»
15 years 6 months ago
Modeling Marginal Distributions of Gabor Coefficients: Application to Biometric Template Reduction
Abstract. Gabor filters have demonstrated their effectiveness in automatic face recognition. However, one drawback of Gabor-based face representations is the huge amount of data th...
Daniel González-Jiménez, José...
BMEI
2008
IEEE
15 years 6 months ago
Clustering of High-Dimensional Gene Expression Data with Feature Filtering Methods and Diffusion Maps
The importance of gene expression data in cancer diagnosis and treatment by now has been widely recognized by cancer researchers in recent years. However, one of the major challen...
Rui Xu, Steven Damelin, Boaz Nadler, Donald C. Wun...
CCS
2008
ACM
15 years 6 months ago
Revocation games in ephemeral networks
A frequently proposed solution to node misbehavior in mobile ad hoc networks is to use reputation systems. But in ephemeral networks - a new breed of mobile networks where contact...
Maxim Raya, Mohammad Hossein Manshaei, Márk...
ISQED
2010
IEEE
156views Hardware» more  ISQED 2010»
15 years 6 months ago
On the design of different concurrent EDC schemes for S-Box and GF(p)
Recent studies have shown that an attacker can retrieve confidential information from cryptographic hardware (e.g. the secret key) by introducing internal faults. A secure and re...
Jimson Mathew, Hafizur Rahaman, Abusaleh M. Jabir,...
« Prev « First page 2194 / 2453 Last » Next »