Sciweavers

384 search results - page 17 / 77
» A Vector Approach to Cryptography Implementation
Sort
View
ICDE
1995
IEEE
98views Database» more  ICDE 1995»
16 years 3 months ago
Relational Database Compression Using Augmented Vector Quantization
Data compression is one way to alleviate the 1/0bottleneck problem faced by I/O-intensive applications such as databases. However, this approach is not widely used because of the ...
Wee Keong Ng, Chinya V. Ravishankar
136
Voted
BMCBI
2007
215views more  BMCBI 2007»
15 years 1 months ago
Learning causal networks from systems biology time course data: an effective model selection procedure for the vector autoregres
Background: Causal networks based on the vector autoregressive (VAR) process are a promising statistical tool for modeling regulatory interactions in a cell. However, learning the...
Rainer Opgen-Rhein, Korbinian Strimmer
ICIP
2009
IEEE
16 years 2 months ago
Mapping Motion Vectors For A Wyner-ziv Video Transcoder
Wyner-Ziv (WZ) coding of video utilizes simple encoders and highly complex decoders. A transcoder from a WZ codec to a traditional codec can potentially increase the range of appl...
114
Voted
ICASSP
2008
IEEE
15 years 8 months ago
Multi-feature vector flow for active contour tracking
In order to achieve both fast tracking and accurate object extraction, we present in this paper an original real-time active contour method, incorporating different feature maps i...
Joanna I. Olszewska, Christophe De Vleeschouwer, B...
103
Voted
ICCSA
2005
Springer
15 years 7 months ago
Security Risk Vector for Quantitative Asset Assessment
There are standard risk analysis methodologies like GMITS and ISO17799, but new threats and vulnerabilities appear day by day because the IT organizations, its infrastructure, and ...
Yoon Jung Chung, In-Jung Kim, Namhoon Lee, Taek Le...