Sciweavers

320 search results - page 63 / 64
» Outlier detection by active learning
Sort
View
CVPR
2007
IEEE
14 years 9 months ago
Automatic Face Recognition from Skeletal Remains
The ability to determine the identity of a skull found at a crime scene is of critical importance to the law enforcement community. Traditional clay-based methods attempt to recon...
Carl Adrian, Nils Krahnstoever, Peter H. Tu, Phil ...
INFOCOM
2010
IEEE
13 years 5 months ago
Neighbor Discovery with Reception Status Feedback to Transmitters
—Neighbor discovery is essential for the process of self-organization of a wireless network, where almost all routing and medium access protocols need knowledge of one-hop neighb...
Ramin Khalili, Dennis Goeckel, Donald F. Towsley, ...
BMCBI
2008
97views more  BMCBI 2008»
13 years 7 months ago
SiteSeek: Post-translational modification analysis using adaptive locality-effective kernel methods and new profiles
Background: Post-translational modifications have a substantial influence on the structure and functions of protein. Post-translational phosphorylation is one of the most common m...
Paul D. Yoo, Yung Shwen Ho, Bing Bing Zhou, Albert...
ASIACRYPT
2009
Springer
14 years 1 months ago
Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices
Abstract. We describe a public-key encryption scheme based on lattices — specifically, based on the hardness of the learning with error (LWE) problem — that is secure against ...
Jonathan Katz, Vinod Vaikuntanathan
ICDM
2002
IEEE
138views Data Mining» more  ICDM 2002»
14 years 9 days ago
Extraction Techniques for Mining Services from Web Sources
The Web has established itself as the dominant medium for doing electronic commerce. Consequently the number of service providers, both large and small, advertising their services...
Hasan Davulcu, Saikat Mukherjee, I. V. Ramakrishna...