Sciweavers

2421 search results - page 411 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
CASES
2006
ACM
14 years 4 months ago
Adaptive object code compression
Previous object code compression schemes have employed static and semiadaptive compression algorithms to reduce the size of instruction memory in embedded systems. The suggestion ...
John Gilbert, David M. Abrahamson
BMCBI
2010
113views more  BMCBI 2010»
13 years 9 months ago
Probabilistic Principal Component Analysis for Metabolomic Data
Background: Data from metabolomic studies are typically complex and high-dimensional. Principal component analysis (PCA) is currently the most widely used statistical technique fo...
Gift Nyamundanda, Lorraine Brennan, Isobel Claire ...
LWA
2007
13 years 11 months ago
Towards Learning User-Adaptive State Models in a Conversational Recommender System
Typical conversational recommender systems support interactive strategies that are hard-coded in advance and followed rigidly during a recommendation session. In fact, Reinforceme...
Tariq Mahmood, Francesco Ricci
SIGMOD
2008
ACM
210views Database» more  SIGMOD 2008»
14 years 10 months ago
Private queries in location based services: anonymizers are not necessary
Mobile devices equipped with positioning capabilities (e.g., GPS) can ask location-dependent queries to Location Based Services (LBS). To protect privacy, the user location must n...
Gabriel Ghinita, Panos Kalnis, Ali Khoshgozaran, C...
ECCV
2004
Springer
14 years 12 months ago
Face Recognition from Facial Surface Metric
Recently, a 3D face recognition approach based on geometric invariant signatures, has been proposed. The key idea is a representation of the facial surface, invariant to isometric ...
Alexander M. Bronstein, Michael M. Bronstein, Alon...