Sciweavers

16513 search results - page 3249 / 3303
» Numerical Analysis Methods
Sort
View
ICASSP
2010
IEEE
13 years 10 months ago
Privacy and security of features extracted from minutiae aggregates
This paper describes our recent analysis on the security and privacy of biometric feature vectors obtained from fingerprint minutiae. A large number of contiguous regions (cuboid...
Abhishek Nagar, Shantanu Rane, Anthony Vetro
ICPR
2010
IEEE
13 years 10 months ago
Incorporating Linguistic Model Adaptation into Whole-Book Recognition
Abstract—Whole-book recognition is a document image analysis strategy that operates on the complete set of a book’s page images using automatic adaptation to improve accuracy. ...
Pingping Xiu, Henry S. Baird
ALMOB
2008
112views more  ALMOB 2008»
13 years 10 months ago
Metabolite-based clustering and visualization of mass spectrometry data using one-dimensional self-organizing maps
Background: One of the goals of global metabolomic analysis is to identify metabolic markers that are hidden within a large background of data originating from high-throughput ana...
Peter Meinicke, Thomas Lingner, Alexander Kaever, ...
ALMOB
2008
95views more  ALMOB 2008»
13 years 10 months ago
A stitch in time: Efficient computation of genomic DNA melting bubbles
Background: It is of biological interest to make genome-wide predictions of the locations of DNA melting bubbles using statistical mechanics models. Computationally, this poses th...
Eivind Tøstesen
ALMOB
2007
133views more  ALMOB 2007»
13 years 10 months ago
Characteristics of predictor sets found using differential prioritization
Background: Feature selection plays an undeniably important role in classification problems involving high dimensional datasets such as microarray datasets. For filter-based featu...
Chia Huey Ooi, Madhu Chetty, Shyh Wei Teng
« Prev « First page 3249 / 3303 Last » Next »