Sciweavers

2265 search results - page 392 / 453
» Recovering Exchanged Data
Sort
View
CRYPTO
2006
Springer
124views Cryptology» more  CRYPTO 2006»
14 years 15 days ago
Mitigating Dictionary Attacks on Password-Protected Local Storage
We address the issue of encrypting data in local storage using a key that is derived from the user's password. The typical solution in use today is to derive the key from the...
Ran Canetti, Shai Halevi, Michael Steiner
MAMMO
2010
Springer
13 years 10 months ago
Mammogram Compression Using Super-Resolution
Abstract. As mammography moves towards completely digital and produces prohibitive amounts of data, compression plays an increasingly important role. Although current lossless comp...
Jun Zheng, Olac Fuentes, Ming-Ying Leung, Elais Ja...
BIOINFORMATICS
2007
137views more  BIOINFORMATICS 2007»
13 years 9 months ago
Annotation-based distance measures for patient subgroup discovery in clinical microarray studies
: Background Clustering algorithms are widely used in the analysis of microarray data. In clinical studies, they are often applied to find groups of co-regulated genes. Clustering...
Claudio Lottaz, Joern Toedling, Rainer Spang
CORR
2010
Springer
114views Education» more  CORR 2010»
13 years 9 months ago
Settling the Polynomial Learnability of Mixtures of Gaussians
Given data drawn from a mixture of multivariate Gaussians, a basic problem is to accurately estimate the mixture parameters. We give an algorithm for this problem that has running ...
Ankur Moitra, Gregory Valiant
CORR
2006
Springer
119views Education» more  CORR 2006»
13 years 8 months ago
Network Inference from Co-Occurrences
The study of networked systems is an emerging field, impacting almost every area of engineering and science, including the important domains of communication systems, biology, soc...
Michael Rabbat, Mário A. T. Figueiredo, Rob...