Sciweavers

961 search results - page 177 / 193
» Visual Cryptography on Graphs
Sort
View
ENVSOFT
2006
76views more  ENVSOFT 2006»
13 years 8 months ago
LQGraph: A software package for optimizing connectivity in conservation planning
LQGraph implements methods for optimizing the connectivity of sites administered to protect biodiversity (a conservation area network). The methods are suitable for existing prote...
Trevon Fuller, Sahotra Sarkar
CLEIEJ
2007
152views more  CLEIEJ 2007»
13 years 8 months ago
Gene Expression Analysis using Markov Chains extracted from RNNs
Abstract. This paper present a new approach for the analysis of gene expression, by extracting a Markov Chain from trained Recurrent Neural Networks (RNNs). A lot of microarray dat...
Igor Lorenzato Almeida, Denise Regina Pechmann Sim...
IVS
2006
127views more  IVS 2006»
13 years 8 months ago
Feature hiding in 3D human body scans
In this paper, we explore a privacy algorithm that detects human private parts in a 3D scan data set. The analogia graph is introduced to study the proportion of structures. The i...
Joseph Laws, Nathaniel Bauernfeind, Yang Cai 0002
JOT
2006
113views more  JOT 2006»
13 years 8 months ago
Constraint Validation in Model Compilers
Model transformation has become one of the most focused research field, motivated by for instance the OMG's Model-Driven Architecture (MDA). Metamodeling is a central techniq...
László Lengyel, Tihamer Levendovszky...
PAMI
2008
153views more  PAMI 2008»
13 years 8 months ago
Correlation Metric for Generalized Feature Extraction
Beyond conventional linear and kernel-based feature extraction, we present a more generalized formulation for feature extraction in this paper. Two representative algorithms using ...
Yun Fu, Shuicheng Yan, Thomas S. Huang