Sciweavers

401 search results - page 63 / 81
» Properties of academic paper references
Sort
View
PAMI
2012
11 years 10 months ago
M-Idempotent and Self-Dual Morphological Filters
—In this paper, we present a comprehensive analysis of self-dual and m-idempotent operators. We refer to an operator as m-idempotent if it converges after m iterations. We focus ...
Nidhal Bouaynaya, Mohammed Charif-Chefchaouni, Dan...
TON
2012
11 years 10 months ago
On New Approaches of Assessing Network Vulnerability: Hardness and Approximation
—Society relies heavily on its networked physical infrastructure and information systems. Accurately assessing the vulnerability of these systems against disruptive events is vit...
Thang N. Dinh, Ying Xuan, My T. Thai, Panos M. Par...
STOC
2006
ACM
120views Algorithms» more  STOC 2006»
14 years 7 months ago
Black-box constructions for secure computation
d abstract) Yuval Ishai Eyal Kushilevitz Yehuda Lindell Erez Petrank It is well known that the secure computation of non-trivial functionalities in the setting of no honest majori...
Yuval Ishai, Eyal Kushilevitz, Yehuda Lindell, Ere...
CONTEXT
2001
Springer
14 years 5 hour ago
Local Holism
Abstract. This paper is devoted to discuss a general tendency in contextualism which is known as "radical contextualism". In the first part I state the well known paradox...
Carlo Penco
BMCBI
2006
118views more  BMCBI 2006»
13 years 7 months ago
Microarray image analysis: background estimation using quantile and morphological filters
Background: In a microarray experiment the difference in expression between genes on the same slide is up to 103 fold or more. At low expression, even a small error in the estimat...
Anders Bengtsson, Henrik Bengtsson