Sciweavers

54 search results - page 10 / 11
» On the Analysis of Linear Probing Hashing
Sort
View
TIFS
2008
157views more  TIFS 2008»
13 years 5 months ago
Subspace Approximation of Face Recognition Algorithms: An Empirical Study
We present a theory for constructing linear subspace approximations to face-recognition algorithms and empirically demonstrate that a surprisingly diverse set of face-recognition a...
Pranab Mohanty, Sudeep Sarkar, Rangachar Kasturi, ...
BMCBI
2008
145views more  BMCBI 2008»
13 years 5 months ago
Mapping gene expression quantitative trait loci by singular value decomposition and independent component analysis
Background: The combination of gene expression profiling with linkage analysis has become a powerful paradigm for mapping gene expression quantitative trait loci (eQTL). To date, ...
Shameek Biswas, John D. Storey, Joshua M. Akey
BMCBI
2005
67views more  BMCBI 2005»
13 years 5 months ago
Sequence signature analysis of chromosome identity in three Drosophila species
Background: All eukaryotic organisms need to distinguish each of their chromosomes. A few protein complexes have been described that recognise entire, specific chromosomes, for in...
Per Stenberg, Fredrik Pettersson, Anja O. Saura, A...
MICCAI
2003
Springer
14 years 6 months ago
Freehand Ultrasound Reconstruction Based on ROI Prior Modeling and Normalized Convolution
3D freehand ultrasound imaging is becoming a widespread technique in medical examinations. This imaging technique produces a set of irregularly spaced B-scans. Reconstructing a reg...
Raúl San José Estépar, Marcos...
CRYPTO
2009
Springer
166views Cryptology» more  CRYPTO 2009»
13 years 12 months ago
Public-Key Cryptosystems Resilient to Key Leakage
Most of the work in the analysis of cryptographic schemes is concentrated in abstract adversarial models that do not capture side-channel attacks. Such attacks exploit various for...
Moni Naor, Gil Segev