Sciweavers

1448 search results - page 255 / 290
» From Requirements to Code Revisited
Sort
View
MEDIAFORENSICS
2010
13 years 9 months ago
Alignment and bit extraction for secure fingerprint biometrics
Security of biometric templates stored in a system is important because a stolen template can compromise system security as well as user privacy. Therefore, a number of secure bio...
Abhishek Nagar, Shantanu Rane, Anthony Vetro
BMCBI
2010
134views more  BMCBI 2010»
13 years 7 months ago
R-Gada: a fast and flexible pipeline for copy number analysis in association studies
Background: Genome-wide association studies (GWAS) using Copy Number Variation (CNV) are becoming a central focus of genetic research. CNVs have successfully provided target genom...
Roger Pique-Regi, Alejandro Cáceres, Juan R...
CAGD
2006
103views more  CAGD 2006»
13 years 7 months ago
The implicit structure of ridges of a smooth parametric surface
Given a smooth surface, a blue (red) ridge is a curve such that at each of its points, the maximum (minimum) principal curvature has an extremum along its curvature line. Ridges a...
Frédéric Cazals, Jean-Charles Faug&e...
PAMI
2008
216views more  PAMI 2008»
13 years 7 months ago
Annotating Images by Mining Image Search Results
Although it has been studied for years by the computer vision and machine learning communities, image annotation is still far from practical. In this paper, we propose a novel atte...
Xin-Jing Wang, Lei Zhang 0001, Xirong Li, Wei-Ying...
ASE
2004
137views more  ASE 2004»
13 years 7 months ago
Automatically Restructuring Programs for the Web
The construction of interactive server-side Web applications differs substantially from the construction of traditional interactive programs. In contrast, existing Web programming...
Jacob Matthews, Robert Bruce Findler, Paul T. Grau...