Sciweavers

457 search results - page 70 / 92
» A relative trust-region algorithm for independent component ...
Sort
View
IDA
2009
Springer
14 years 7 months ago
Estimating Hidden Influences in Metabolic and Gene Regulatory Networks
We address the applicability of blind source separation (BSS) methods for the estimation of hidden influences in biological dynamic systems such as metabolic or gene regulatory net...
Florian Blöchl, Fabian J. Theis
ACISP
2006
Springer
15 years 3 months ago
On Exact Algebraic [Non-]Immunity of S-Boxes Based on Power Functions
In this paper we are interested in algebraic immunity of several well known highly-nonlinear vectorial Boolean functions (or Sboxes), designed for block and stream ciphers. Unfortu...
Nicolas Courtois, Blandine Debraize, Eric Garrido
ICPR
2004
IEEE
15 years 10 months ago
Recognition of Expression Variant Faces Using Weighted Subspaces
In the past decade or so, subspace methods have been largely used in face recognition ? generally with quite success. Subspace approaches, however, generally assume the training d...
Aleix M. Martínez, Yongbin Zhang
UIST
2006
ACM
15 years 3 months ago
Robust computer vision-based detection of pinching for one and two-handed gesture input
We present a computer vision technique to detect when the user brings their thumb and forefinger together (a pinch gesture) for close-range and relatively controlled viewing circu...
Andrew D. Wilson
VALUETOOLS
2006
ACM
166views Hardware» more  VALUETOOLS 2006»
15 years 3 months ago
Web graph analyzer tool
We present the software tool “Web Graph Analyzer”. This tool is designed to perform a comprehensive analysis of the Web Graph structure. By Web Graph we mean a graph whose ver...
Konstantin Avrachenkov, Danil Nemirovsky, Natalia ...