Sciweavers

56 search results - page 3 / 12
» Configuration Independent Analysis for Characterizing Shared...
Sort
View
ICDE
2005
IEEE
100views Database» more  ICDE 2005»
14 years 7 months ago
Configurable Security Protocols for Multi-party Data Analysis with Malicious Participants
Standard multi-party computation models assume semi-honest behavior, where the majority of participants implement protocols according to specification, an assumption not always pl...
Bradley Malin, Edoardo Airoldi, Samuel Edoho-Eket,...
ICPR
2006
IEEE
14 years 6 months ago
Texture Segmentation Using Independent Component Analysis of Gabor Features
This paper proposes a novel method for texture segmentation using independent component analysis (ICA) of Gabor features (called ICAG). It has three distinguished aspects. (1) Gab...
Yang Chen, Runsheng Wang
PAMI
2007
127views more  PAMI 2007»
13 years 5 months ago
Text-Independent Writer Identification and Verification Using Textural and Allographic Features
—The identification of a person on the basis of scanned images of handwriting is a useful biometric modality with application in forensic and historic document analysis and const...
Marius Bulacu, Lambert Schomaker
BMCBI
2008
158views more  BMCBI 2008»
13 years 5 months ago
Analyzing M-CSF dependent monocyte/macrophage differentiation: Expression modes and meta-modes derived from an independent compo
Background: The analysis of high-throughput gene expression data sets derived from microarray experiments still is a field of extensive investigation. Although new approaches and ...
Dominik Lutter, Peter Ugocsai, Margot Grandl, Evel...
ISPASS
2008
IEEE
14 years 1 days ago
An Analysis of I/O And Syscalls In Critical Sections And Their Implications For Transactional Memory
Transactional memory (TM) is a scalable and concurrent way to build atomic sections. One aspect of TM that remains unclear is how side-effecting operations – that is, those whic...
Lee Baugh, Craig B. Zilles