Sciweavers

1625 search results - page 240 / 325
» Privacy-preserving data publishing
Sort
View
ICMCS
2010
IEEE
178views Multimedia» more  ICMCS 2010»
15 years 5 months ago
Optimal configuration of hash table based multimedia fingerprint databases using weak bits
The increasingly large amount of digital multimedia content has created a need for technologies to search and identify multimedia files. Multimedia fingerprinting has been widely ...
Claus Bauer, Regunathan Radhakrishnan, Wenyu Jiang
135
Voted
ICMCS
2010
IEEE
150views Multimedia» more  ICMCS 2010»
15 years 4 months ago
Turning enemies into friends: Using reflections to improve sound source localization
Sound Source Localization (SSL) based on microphone arrays has numerous applications, and has received significant research attention. Common to all published research is the obs...
Flavio Ribeiro, Demba E. Ba, Cha Zhang, Dinei A. F...
BMCBI
2010
119views more  BMCBI 2010»
15 years 4 months ago
Functional classification of proteins based on projection of amino acid sequences: application for prediction of protein kinase
Background: The knowledge about proteins with specific interaction capacity to the protein partners is very important for the modeling of cell signaling networks. However, the exp...
Boris Sobolev, Dmitry Filimonov, Alexey Lagunin, A...
CORR
2008
Springer
95views Education» more  CORR 2008»
15 years 4 months ago
An Indirect Genetic Algorithm for a Nurse Scheduling Problem
This paper describes a Genetic Algorithms approach to a manpower-scheduling problem arising at a major UK hospital. Although Genetic Algorithms have been successfully used for sim...
Uwe Aickelin, Kathryn A. Dowsland
CAD
2006
Springer
15 years 4 months ago
Field modeling with sampled distances
Traditional mesh-based approaches to the modeling and analysis of physical fields within geometric models require some form of topological reconstruction and conversion in the mes...
Michael Freytag, Vadim Shapiro, Igor G. Tsukanov