Sciweavers

3272 search results - page 455 / 655
» Privacy in Data Publishing
Sort
View
SICHERHEIT
2008
15 years 6 months ago
A Cryptographic Biometric Authentication System based on Genetic Fingerprints
We specify a system for authentication and key derivation using genetic fingerprints which prevents the recovery of biometric information from data stored for verification. We pre...
Ulrike Korte, Michael Krawczak, Johannes Merkle, R...
EMNLP
2004
15 years 6 months ago
Sentiment Analysis using Support Vector Machines with Diverse Information Sources
This paper introduces an approach to sentiment analysis which uses support vector machines (SVMs) to bring together diverse sources of potentially pertinent information, including...
Tony Mullen, Nigel Collier
IMAMS
2003
125views Mathematics» more  IMAMS 2003»
15 years 5 months ago
A Graph-Spectral Method for Surface Height Recovery
This paper describes a graph-spectral method for 3D surface integration. The algorithm takes as its input a 2D field of surface normal estimates, delivered, for instance, by a sh...
Antonio Robles-Kelly, Edwin R. Hancock
IMAMS
2003
93views Mathematics» more  IMAMS 2003»
15 years 5 months ago
Vector Transport for Shape-from-Shading
In this paper we describe a new shape-from-shading method. We show how the parallel transport of surface normals can be used to impose curvature consistency and also to iterativel...
Fabio Sartori, Edwin R. Hancock
CEC
2010
IEEE
15 years 5 months ago
Two novel Ant Colony Optimization approaches for Bayesian network structure learning
Learning Bayesian networks from data is an N-P hard problem with important practical applications. Several researchers have designed algorithms to overcome the computational comple...
Yanghui Wu, John A. W. McCall, David W. Corne