Sciweavers

3317 search results - page 568 / 664
» Strategies in Rigid-Variable Methods
Sort
View
PVLDB
2008
82views more  PVLDB 2008»
15 years 3 months ago
Mining non-redundant high order correlations in binary data
Many approaches have been proposed to find correlations in binary data. Usually, these methods focus on pair-wise correlations. In biology applications, it is important to find co...
Xiang Zhang, Feng Pan, Wei Wang 0010, Andrew B. No...
TITB
2008
204views more  TITB 2008»
15 years 3 months ago
A Cryptographic Approach to Securely Share and Query Genomic Sequences
To support large-scale biomedical research projects, organizations need to share person-specific genomic sequences without violating the privacy of their data subjects. In the past...
Murat Kantarcioglu, Wei Jiang, Ying Liu, Bradley M...
SIGGRAPH
2010
ACM
15 years 3 months ago
Nonlinear disparity mapping for stereoscopic 3D
This paper addresses the problem of remapping the disparity range of stereoscopic images and video. Such operations are highly important for a variety of issues arising from the p...
Manuel Lang, Alexander Hornung, Oliver Wang, Steve...
CIKM
2010
Springer
15 years 3 months ago
Exploiting site-level information to improve web search
Ranking Web search results has long evolved beyond simple bag-of-words retrieval models. Modern search engines routinely employ machine learning ranking that relies on exogenous r...
Andrei Z. Broder, Evgeniy Gabrilovich, Vanja Josif...
INFOCOM
2010
IEEE
15 years 2 months ago
Joint Power and Secret Key Queue Management for Delay Limited Secure Communication
—In recent years, the famous wiretap channel has been revisited by many researchers and information theoretic secrecy has become an active area of research in this setting. In th...
Onur Güngör 0002, Jian Tan, Can Emre Kok...