Sciweavers

262 search results - page 10 / 53
» Secure Hamming Distance Based Computation and Its Applicatio...
Sort
View
SSDBM
2010
IEEE
220views Database» more  SSDBM 2010»
14 years 11 days ago
Prefix Tree Indexing for Similarity Search and Similarity Joins on Genomic Data
Similarity search and similarity join on strings are important for applications such as duplicate detection, error detection, data cleansing, or comparison of biological sequences....
Astrid Rheinländer, Martin Knobloch, Nicky Ho...
ACSAC
2004
IEEE
13 years 11 months ago
Correlating Intrusion Events and Building Attack Scenarios Through Attack Graph Distances
We map intrusion events to known exploits in the network attack graph, and correlate the events through the corresponding attack graph distances. From this, we construct attack sc...
Steven Noel, Eric Robertson, Sushil Jajodia
BMCBI
2006
111views more  BMCBI 2006»
13 years 8 months ago
PepDist: A New Framework for Protein-Peptide Binding Prediction based on Learning Peptide Distance Functions
Background: Many different aspects of cellular signalling, trafficking and targeting mechanisms are mediated by interactions between proteins and peptides. Representative examples...
Tomer Hertz, Chen Yanover
EMMCVPR
1997
Springer
14 years 6 days ago
Genetic Algorithms for Ambiguous Labelling Problems
Consistent labelling problems frequently have more than one solution. Most work in the "eld has aimed at disambiguating early in the interpretation process, using only local ...
Richard Myers, Edwin R. Hancock
BMVC
2000
13 years 9 months ago
The Cross Ratio: A Revisit to its Probability Density Function
The cross ratio has wide applications in computer vision because of its invariance under projective transformation. In active vision where the projections of quadruples of colline...
D. Q. Huynh