Sciweavers

3251 search results - page 612 / 651
» On a vector q-d algorithm
Sort
View
ICALP
2001
Springer
14 years 2 days ago
Permutation Editing and Matching via Embeddings
Abstract. If the genetic maps of two species are modelled as permutations of (homologous) genes, the number of chromosomal rearrangements in the form of deletions, block moves, inv...
Graham Cormode, S. Muthukrishnan, Süleyman Ce...
CRYPTO
2000
Springer
175views Cryptology» more  CRYPTO 2000»
13 years 12 months ago
A Chosen-Ciphertext Attack against NTRU
We present a chosen-ciphertext attack against the public key cryptosystem called NTRU. This cryptosystem is based on polynomial algebra. Its security comes from the interaction of ...
Éliane Jaulmes, Antoine Joux
ECLIPSE
2007
ACM
13 years 11 months ago
Predicting buggy changes inside an integrated development environment
We present a tool that predicts whether the software under development inside an IDE has a bug. An IDE plugin performs this prediction, using the Change Classification technique t...
Janaki T. Madhavan, E. James Whitehead Jr.
CLEF
2006
Springer
13 years 11 months ago
Medical Image Annotation and Retrieval Using Visual Features
In this article, we present the algorithms and results of our participation in the medical image annotation and retrieval tasks of ImageCLEFmed 2006. We exploit both global featur...
Jing Liu, Yang Hu, Mingjing Li, Songde Ma, Wei-Yin...
CIVR
2008
Springer
138views Image Analysis» more  CIVR 2008»
13 years 9 months ago
MyPlaces: detecting important settings in a visual diary
We describe a novel approach to identifying specific settings in large collections of passively captured images corresponding to a visual diary. An algorithm developed for setting...
Michael Blighe, Noel E. O'Connor