Sciweavers

4397 search results - page 877 / 880
» Relational Algebra Operations
Sort
View
BMCBI
2011
12 years 11 months ago
NeurphologyJ: an automatic neuronal morphology quantification method and its application in pharmacological discovery
Background: Automatic quantification of neuronal morphology from images of fluorescence microscopy plays an increasingly important role in high-content screenings. However, there ...
Shinn-Ying Ho, Chih-Yuan Chao, Hui-Ling Huang, Tza...
CTRSA
2011
Springer
223views Cryptology» more  CTRSA 2011»
12 years 11 months ago
Expedient Non-malleability Notions for Hash Functions
Non-malleability of a cryptographic primitive is a fundamental security property which ensures some sort of independence of cryptographic values. The notion has been extensively st...
Paul Baecher, Marc Fischlin, Dominique Schröd...
CVIU
2011
12 years 11 months ago
Graph-based quadratic optimization: A fast evolutionary approach
Quadratic optimization lies at the very heart of many structural pattern recognition and computer vision problems, such as graph matching, object recognition, image segmentation, ...
Samuel Rota Bulò, Marcello Pelillo, Immanue...
FOCM
2011
188views more  FOCM 2011»
12 years 11 months ago
Compressive Wave Computation
This paper considers large-scale simulations of wave propagation phenomena. We argue that it is possible to accurately compute a wavefield by decomposing it onto a largely incomp...
Laurent Demanet, Gabriel Peyré
MOBISYS
2011
ACM
12 years 10 months ago
Security versus energy tradeoffs in host-based mobile malware detection
The rapid growth of mobile malware necessitates the presence of robust malware detectors on mobile devices. However, running malware detectors on mobile devices may drain their ba...
Jeffrey Bickford, H. Andrés Lagar-Cavilla, ...