Sciweavers

186 search results - page 19 / 38
» Generalized deviations in risk analysis
Sort
View
ICPR
2006
IEEE
14 years 9 months ago
Estimating the location of illuminants in realist master paintings Computer image analysis addresses a debate in art history of
In cast-shadow analysis one merely draws a line between each occluder and its associated shadow cast onto a different surface, possibly with wedges indicating precision. In some c...
ITC
1998
IEEE
94views Hardware» more  ITC 1998»
14 years 4 days ago
A method of serial data jitter analysis using one-shot time interval measurements
A method for measuring inter-symbol interference, duty cycle distortion, random jitter and periodic jitter is described. The Blackman-Tukey method of signal analysis is used. This...
Jan B. Wilstrup
WWW
2007
ACM
14 years 8 months ago
Analysis of topological characteristics of huge online social networking services
Social networking services are a fast-growing business in the Internet. However, it is unknown if online relationships and their growth patterns are the same as in real-life socia...
Yong-Yeol Ahn, Seungyeop Han, Haewoon Kwak, Sue B....
BMCBI
2011
13 years 2 months ago
The impact of quantitative optimization of hybridization conditions on gene expression analysis
Background: With the growing availability of entire genome sequences, an increasing number of scientists can exploit oligonucleotide microarrays for genome-scale expression studie...
Peter Sykacek, David P. Kreil, Lisa A. Meadows, Ri...
SDM
2007
SIAM
204views Data Mining» more  SDM 2007»
13 years 9 months ago
Flexible Anonymization For Privacy Preserving Data Publishing: A Systematic Search Based Approach
k-anonymity is a popular measure of privacy for data publishing: It measures the risk of identity-disclosure of individuals whose personal information are released in the form of ...
Bijit Hore, Ravi Chandra Jammalamadaka, Sharad Meh...