Sciweavers

1329 search results - page 233 / 266
» Phantom faces for face analysis
Sort
View
147
Voted
VIROLOGY
2010
179views more  VIROLOGY 2010»
15 years 2 months ago
Automatic binary deobfuscation
Abstract. This paper gives an overview of our research in the automation of the process of software protection analysis. We will focus more particularly on the problem of obfuscati...
Yoann Guillot, Alexandre Gazet
141
Voted
CVPR
2005
IEEE
16 years 5 months ago
Graph Embedding: A General Framework for Dimensionality Reduction
In the last decades, a large family of algorithms supervised or unsupervised; stemming from statistic or geometry theory have been proposed to provide different solutions to the p...
Shuicheng Yan, Dong Xu, Benyu Zhang, HongJiang Zha...
129
Voted
MICCAI
2008
Springer
16 years 4 months ago
A Novel Explicit 2D+t Cyclic Shape Model Applied to Echocardiography
In this paper, we propose a novel explicit 2D+t cyclic shape model that extends the Point Distribution Model (PDM) to shapes like myocardial contours with cyclic dynamics. We also ...
Ramón Casero, J. Alison Noble
147
Voted
BMCBI
2008
259views more  BMCBI 2008»
15 years 3 months ago
DISCLOSE : DISsection of CLusters Obtained by SEries of transcriptome data using functional annotations and putative transcripti
Background: A typical step in the analysis of gene expression data is the determination of clusters of genes that exhibit similar expression patterns. Researchers are confronted w...
Evert-Jan Blom, Sacha A. F. T. van Hijum, Klaas J....
99
Voted
BMCBI
2008
94views more  BMCBI 2008»
15 years 3 months ago
A comprehensive re-analysis of the Golden Spike data: Towards a benchmark for differential expression methods
Background: The Golden Spike data set has been used to validate a number of methods for summarizing Affymetrix data sets, sometimes with seemingly contradictory results. Much less...
Richard D. Pearson