Sciweavers

4480 search results - page 892 / 896
» Prototyping Completion with Constraints Using Computational ...
Sort
View
MEDIAFORENSICS
2010
13 years 6 months ago
Biometric template transformation: a security analysis
One of the critical steps in designing a secure biometric system is protecting the templates of the users that are stored either in a central database or on smart cards. If a biom...
Abhishek Nagar, Karthik Nandakumar, Anil K. Jain
BMCBI
2011
13 years 2 months ago
Detection of viral sequence fragments of HIV-1 subfamilies yet unknown
Background: Methods of determining whether or not any particular HIV-1 sequence stems - completely or in part - from some unknown HIV-1 subtype are important for the design of vac...
Thomas Unterthiner, Anne-Kathrin Schultz, Jan Bull...
TMI
2011
144views more  TMI 2011»
13 years 2 months ago
Automated Mitosis Detection of Stem Cell Populations in Phase-Contrast Microscopy Images
—Due to the enormous potential and impact that stem cells may have on regenerative medicine, there has been a rapidly growing interest for tools to analyze and characterize the b...
Seungil Huh, Dai Fei E. Ker, Ryoma Bise, Mei Chen,...
SIAMCOMP
2010
109views more  SIAMCOMP 2010»
13 years 2 months ago
Analysis of Delays Caused by Local Synchronization
Synchronization is often necessary in parallel computing, but it can create delays whenever the receiving processor is idle, waiting for the information to arrive. This is especia...
Julia Lipman, Quentin F. Stout
SIGECOM
2011
ACM
216views ECommerce» more  SIGECOM 2011»
12 years 10 months ago
Strategic sequential voting in multi-issue domains and multiple-election paradoxes
In many settings, a group of agents must come to a joint decision on multiple issues. In practice, this is often done by voting on the issues in sequence. In this paper, we model ...
Lirong Xia, Vincent Conitzer, Jérôme ...