Sciweavers

11455 search results - page 27 / 2291
» The Rayset and Its Applications
Sort
View
ACNS
2009
Springer
162views Cryptology» more  ACNS 2009»
14 years 3 months ago
Secure Hamming Distance Based Computation and Its Applications
Abstract. This paper examines secure two-party computation of functions which depend only on the Hamming distance of the inputs of the two parties. We present efficient protocols f...
Ayman Jarrous, Benny Pinkas
SGAI
2009
Springer
14 years 3 months ago
Leveraging Sub-class Partition Information in Binary Classification and Its Application
Sub-class partition information within positive and negative classes is often ignored by a binary classifier, even when these detailed background information is available at hand. ...
Baoli Li, Carl Vogel
ICIP
2008
IEEE
14 years 3 months ago
Graph-cut optimization of the ratio of functions and its application to image segmentation
Optimizing the ratio of two functions of binary variables is a common task in many image analysis applications. In general, such a ratio is not amenable to graph-cut based optimiz...
Hui Wang, Nilanjan Ray, Hong Zhang
DIS
2007
Springer
14 years 3 months ago
Literature Based Discovery Support System and Its Application to Disease Gene Identification
We present an interactive discovery support system, which for a given starting concept of interest, discovers new, potentially meaningful relations with other concepts that have no...
Dimitar Hristovski, Borut Peterlin, Saso Dzeroski,...
IJCNN
2006
IEEE
14 years 2 months ago
A Variable Node-to-Node-Link Neural Network and Its Application to Hand-Written Recognition
- This paper presents a variable node-to-node-link neural network (VN2 NN) trained by real-coded genetic algorithm (RCGA). The VN2 NN exhibits a node-to-node relationship in the hi...
Sai-Ho Ling, F. H. Frank Leung, Hak-Keung Lam