Sciweavers

16513 search results - page 3249 / 3303
» Numerical Analysis Methods
Sort
View
ICASSP
2010
IEEE
15 years 2 months ago
Privacy and security of features extracted from minutiae aggregates
This paper describes our recent analysis on the security and privacy of biometric feature vectors obtained from fingerprint minutiae. A large number of contiguous regions (cuboid...
Abhishek Nagar, Shantanu Rane, Anthony Vetro
104
Voted
ICPR
2010
IEEE
15 years 2 months ago
Incorporating Linguistic Model Adaptation into Whole-Book Recognition
Abstract—Whole-book recognition is a document image analysis strategy that operates on the complete set of a book’s page images using automatic adaptation to improve accuracy. ...
Pingping Xiu, Henry S. Baird
ALMOB
2008
112views more  ALMOB 2008»
15 years 2 months ago
Metabolite-based clustering and visualization of mass spectrometry data using one-dimensional self-organizing maps
Background: One of the goals of global metabolomic analysis is to identify metabolic markers that are hidden within a large background of data originating from high-throughput ana...
Peter Meinicke, Thomas Lingner, Alexander Kaever, ...
99
Voted
ALMOB
2008
95views more  ALMOB 2008»
15 years 2 months ago
A stitch in time: Efficient computation of genomic DNA melting bubbles
Background: It is of biological interest to make genome-wide predictions of the locations of DNA melting bubbles using statistical mechanics models. Computationally, this poses th...
Eivind Tøstesen
ALMOB
2007
133views more  ALMOB 2007»
15 years 2 months ago
Characteristics of predictor sets found using differential prioritization
Background: Feature selection plays an undeniably important role in classification problems involving high dimensional datasets such as microarray datasets. For filter-based featu...
Chia Huey Ooi, Madhu Chetty, Shyh Wei Teng
« Prev « First page 3249 / 3303 Last » Next »