Sciweavers

217 search results - page 31 / 44
» Selecting Cryptographic Key Sizes
Sort
View
RECOMB
2002
Springer
14 years 8 months ago
String barcoding: uncovering optimal virus signatures
There are many critical situations when one needs to rapidly identify an unidentified pathogen from among a given set of previously sequenced pathogens. DNA or RNA hybridization c...
Sam Rash, Dan Gusfield
RECOMB
2008
Springer
14 years 8 months ago
Constructing Treatment Portfolios Using Affinity Propagation
A key problem of interest to biologists and medical researchers is the selection of a subset of queries or treatments that provide maximum utility for a population of targets. For ...
Delbert Dueck, Brendan J. Frey, Nebojsa Jojic, Vla...
PRL
2007
154views more  PRL 2007»
13 years 7 months ago
Regularized mixture discriminant analysis
Abstract – In this paper we seek a Gaussian mixture model (GMM) of the classconditional densities for plug-in Bayes classification. We propose a method for setting the number of ...
Zohar Halbe, Mayer Aladjem
CIVR
2007
Springer
254views Image Analysis» more  CIVR 2007»
13 years 12 months ago
Soccer players identification based on visual local features
Semantic detection and recognition of objects and events contained in a video stream has to be performed in order to provide content-based annotation and retrieval of videos. This...
Lamberto Ballan, Marco Bertini, Alberto Del Bimbo,...
SACRYPT
2007
Springer
14 years 2 months ago
Two Trivial Attacks on Trivium
Trivium is a stream cipher designed in 2005 by C. De Canni`ere and B. Preneel for the European project eSTREAM. It has successfully passed the first phase of the project and has ...
Alexander Maximov, Alex Biryukov