Sciweavers

569 search results - page 114 / 114
» Online Bounds for Bayesian Algorithms
Sort
View
CCS
2006
ACM
13 years 8 months ago
Finding the original point set hidden among chaff
In biometric identification, a fingerprint is typically represented as a set of minutiae which are 2D points. A method [4] to protect the fingerprint template hides the minutiae b...
Ee-Chien Chang, Ren Shen, Francis Weijian Teo
DAGSTUHL
2006
13 years 6 months ago
Taming Dynamic and Selfish Peers
This paper addresses two important challenges for current P2P systems, namely churn and selfishness. First, we report on a system [19] whose desirable properties (small peer degre...
Stefan Schmid, Fabian Kuhn, Thomas Moscibroda, Rog...
SDM
2012
SIAM
247views Data Mining» more  SDM 2012»
11 years 7 months ago
Image Mining of Historical Manuscripts to Establish Provenance
he recent digitization of more than twenty million books has been led by initiatives from countries wishing to preserve their cultural heritage and by commercial endeavors, such a...
Bing Hu, Thanawin Rakthanmanon, Bilson J. L. Campa...
BMCBI
2006
159views more  BMCBI 2006»
13 years 4 months ago
EpiJen: a server for multistep T cell epitope prediction
Background: The main processing pathway for MHC class I ligands involves degradation of proteins by the proteasome, followed by transport of products by the transporter associated...
Irini A. Doytchinova, Pingping Guan, Darren R. Flo...