Sciweavers

717 search results - page 127 / 144
» Efficient implementation of SVM for large class problems
Sort
View
JOC
2000
181views more  JOC 2000»
13 years 8 months ago
Security Arguments for Digital Signatures and Blind Signatures
Abstract. Since the appearance of public-key cryptography in the seminal DiffieHellman paper, many new schemes have been proposed and many have been broken. Thus, the simple fact t...
David Pointcheval, Jacques Stern
CVPR
1996
IEEE
14 years 18 days ago
Extracting Salient Curves from Images: An Analysis of the Saliency Network
The Saliency Network proposed by Shashua and Ullman (1988) is a well-known approach to the problem of extracting salient curves from images while performing gap completion. This pa...
T. D. Alter, Ronen Basri
CIKM
1999
Springer
14 years 21 days ago
Performance and Implications of Semantic Indexing in a Distributed Environment
A research prototype is presented for semantic indexing and retrieval in Information Retrieval. The prototype is motivated by a desire to provide a more efficient and effective in...
Conrad T. K. Chang, Bruce R. Schatz
VVS
1998
IEEE
126views Visualization» more  VVS 1998»
14 years 20 days ago
Semi-Automatic Generation of Transfer Functions for Direct Volume Rendering
Although direct volume rendering is a powerful tool for visualizing complex structures within volume data, the size and complexity of the parameter space controlling the rendering...
Gordon L. Kindlmann, James W. Durkin
BMCBI
2010
170views more  BMCBI 2010»
13 years 8 months ago
Integrative analysis of gene expression and copy number alterations using canonical correlation analysis
Background: With the rapid development of new genetic measurement methods, several types of genetic alterations can be quantified in a high-throughput manner. While the initial fo...
Charlotte Soneson, Henrik Lilljebjörn, Thoas ...