Sciweavers

403 search results - page 60 / 81
» Bits through ARQs
Sort
View
DICTA
2007
14 years 11 months ago
Biometric Based Cryptographic Key Generation from Faces
Existing asymmetric encryption algorithms require the storage of the secret private key. Stored keys are often protected by poorly selected user passwords that can either be guess...
B. Chen, V. Chandran
DMIN
2007
158views Data Mining» more  DMIN 2007»
14 years 11 months ago
Mining Frequent Itemsets Using Re-Usable Data Structure
- Several algorithms have been introduced for mining frequent itemsets. The recent datasettransformation approach suffers either from the possible increasing in the number of struc...
Mohamed Yakout, Alaaeldin M. Hafez, Hussein Aly
VIP
2001
14 years 11 months ago
Video Cataloguing and Browsing
Videos contain rich information. Until recently, information within a video had been largely left under-utilized, with fast forward/rewind as the most popular method of accessing ...
Jeff E. Tandianus, Andrias Chandra, Jesse S. Jin
VG
2003
14 years 11 months ago
Rapid Emission Tomography Reconstruction
We present new implementations of the Maximum Likelihood Expectation Maximization (EM) algorithm and the related Ordered Subset EM (OSEM) algorithm. Our implementation is based on...
Ken Chidlow, Torsten Möller
NAACL
1994
14 years 11 months ago
MACROPHONE: An American English Telephone Speech Corpus
Macrophone is a corpus of approximately 200,000 utterances, recorded over the telephone from a broad sample of about 5,000 American speakers. Sponsored by the Linguistic Data Cons...
Kelsey Taussig, Jared Bernstein