Sciweavers

1282 search results - page 176 / 257
» Practical Loss-Resilient Codes
Sort
View
CORR
2008
Springer
120views Education» more  CORR 2008»
13 years 10 months ago
A new distance for high level RNA secondary structure comparison
We describe an algorithm for comparing two RNA secondary structures coded in the form of trees that introduces two new operations, called node fusion and edge fusion, besides the t...
Julien Allali, Marie-France Sagot
CORR
2006
Springer
66views Education» more  CORR 2006»
13 years 10 months ago
MDL Denoising Revisited
We refine and extend an earlier MDL denoising criterion for wavelet-based denoising. We start by showing that the denoising problem can be reformulated as a clustering problem, whe...
Teemu Roos, Petri Myllymäki, Jorma Rissanen
IJNSEC
2008
209views more  IJNSEC 2008»
13 years 10 months ago
Application-Specific Key Release Scheme from Biometrics
This paper outlines a novel biometric key release scheme to bind application-specific key from biometric data such that the key can be retrieved effectively by using DiscreteHashi...
Thian Song Ong, Andrew Teoh Beng Jin, David Chek L...
IJMMS
2006
119views more  IJMMS 2006»
13 years 10 months ago
Pair programming productivity: Novice-novice vs. expert-expert
Agile Software Development methodologies have grown in popularity both among academic researchers and industrial practitioners. Among the various methodologies or practices propos...
Kim Man Lui, Keith C. C. Chan
IJNSEC
2006
71views more  IJNSEC 2006»
13 years 10 months ago
Fundamental Limits on a Model of Privacy-Trust Tradeoff: Information Theoretic Approach
Zhong et al. formulated the problem of disclosing credentials (associated with privacy) for building trust in an open environment like Internet. Thus, one form of privacy-trust pr...
Rama Murthy Garimella