Sciweavers

15351 search results - page 2762 / 3071
» The information bottleneck method
Sort
View
INFOCOM
2011
IEEE
14 years 7 months ago
Maintaining source privacy under eavesdropping and node compromise attacks
—In a sensor network, an important problem is to provide privacy to the event detecting sensor node and integrity to the data gathered by the node. Compromised source privacy can...
Kanthakumar Pongaliur, Li Xiao
IWMM
2011
Springer
217views Hardware» more  IWMM 2011»
14 years 7 months ago
On the theory and potential of LRU-MRU collaborative cache management
The goal of cache management is to maximize data reuse. Collaborative caching provides an interface for software to communicate access information to hardware. In theory, it can o...
Xiaoming Gu, Chen Ding
NAR
2011
204views Computer Vision» more  NAR 2011»
14 years 7 months ago
CLIPZ: a database and analysis environment for experimentally determined binding sites of RNA-binding proteins
The stability, localization and translation rate of mRNAs are regulated by a multitude of RNAbinding proteins (RBPs) that find their targets directly or with the help of guide RNA...
Mohsen Khorshid, Christoph Rodak, Mihaela Zavolan
PAMI
2011
14 years 7 months ago
Robust Object Tracking with Online Multiple Instance Learning
In this paper we address the problem of tracking an object in a video given its location in the first frame and no other information. Recently, a class of tracking techniques cal...
Boris Babenko, Ming-Hsuan Yang, Serge Belongie
PRL
2011
14 years 7 months ago
Structural matching of 2D electrophoresis gels using deformed graphs
2D electrophoresis is a well known method for protein separation which is extremely useful in the field of proteomics. Each spot in the image represents a protein accumulation an...
Alexandre Noma, Alvaro Pardo, Roberto Marcondes Ce...
« Prev « First page 2762 / 3071 Last » Next »