Sciweavers

1592 search results - page 273 / 319
» On the Equality of Probabilistic Terms
Sort
View
ICASSP
2010
IEEE
13 years 8 months ago
Privacy and security of features extracted from minutiae aggregates
This paper describes our recent analysis on the security and privacy of biometric feature vectors obtained from fingerprint minutiae. A large number of contiguous regions (cuboid...
Abhishek Nagar, Shantanu Rane, Anthony Vetro
AI
2007
Springer
13 years 7 months ago
Audiences in argumentation frameworks
Although reasoning about what is the case has been the historic focus of logic, reasoning about what should be done is an equally important capacity for an intelligent agent. Reas...
Trevor J. M. Bench-Capon, Sylvie Doutre, Paul E. D...
BMCBI
2007
106views more  BMCBI 2007»
13 years 7 months ago
Improved classification accuracy in 1- and 2-dimensional NMR metabolomics data using the variance stabilising generalised logari
Background: Classifying nuclear magnetic resonance (NMR) spectra is a crucial step in many metabolomics experiments. Since several multivariate classification techniques depend up...
Helen M. Parsons, Christian Ludwig, Ulrich L. G&uu...
CORR
2010
Springer
149views Education» more  CORR 2010»
13 years 7 months ago
Pebbling and Branching Programs Solving the Tree Evaluation Problem
We study restricted computation models related to the tree evaluation problem. The TEP was introduced in earlier work as a simple candidate for the (very) long term goal of separa...
Dustin Wehr
CORR
2008
Springer
105views Education» more  CORR 2008»
13 years 7 months ago
Success Exponent of Wiretapper: A Tradeoff between Secrecy and Reliability
Equivocation has been widely used as a measure of security after Shannon[10]. For an infinite system such as the wiretap channel defined in [2], equivocation is unbounded and so e...
Chung Chan