Sciweavers

5740 search results - page 985 / 1148
» Application of Level Set Methods in Computer Vision
Sort
View
COMPGEOM
2009
ACM
15 years 8 months ago
Proximity of persistence modules and their diagrams
Topological persistence has proven to be a key concept for the study of real-valued functions defined over topological spaces. Its validity relies on the fundamental property tha...
Frédéric Chazal, David Cohen-Steiner...
RECOMB
2004
Springer
16 years 2 months ago
The evolutionary capacity of protein structures
In nature, one finds large collections of different protein sequences exhibiting roughly the same three-dimensional structure, and this observation underpins the study of structur...
Leonid Meyerguz, David Kempe, Jon M. Kleinberg, Ro...
SDM
2009
SIAM
225views Data Mining» more  SDM 2009»
15 years 11 months ago
Integrated KL (K-means - Laplacian) Clustering: A New Clustering Approach by Combining Attribute Data and Pairwise Relations.
Most datasets in real applications come in from multiple sources. As a result, we often have attributes information about data objects and various pairwise relations (similarity) ...
Fei Wang, Chris H. Q. Ding, Tao Li
PERCOM
2009
ACM
15 years 9 months ago
iMAP: Indirect Measurement of Air Pollution with Cellphones
Abstract—In this paper, we introduce the cellphonebased indirect sensing problem. While participatory sensing aims at monitoring of a phenomenon by deploying a dense set of senso...
Murat Demirbas, Carole Rudra, Atri Rudra, Murat Al...
TPDS
1998
94views more  TPDS 1998»
15 years 1 months ago
Access Control and Signatures via Quorum Secret Sharing
—We suggest a method of controlling the access to a secure database via quorum systems. A quorum system is a collection of sets (quorums) every two of which have a nonempty inter...
Moni Naor, Avishai Wool