Sciweavers

1298 search results - page 227 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
CORR
2010
Springer
112views Education» more  CORR 2010»
15 years 2 months ago
Colour Guided Colour Image Steganography
Information security has become a cause of concern because of the electronic eavesdropping. Capacity, robustness and invisibility are important parameters in information hiding and...
R. Amirtharajan, Sandeep Kumar Behera, Motamarri A...
BMCBI
2006
113views more  BMCBI 2006»
15 years 2 months ago
GibbsST: a Gibbs sampling method for motif discovery with enhanced resistance to local optima
Background: Computational discovery of transcription factor binding sites (TFBS) is a challenging but important problem of bioinformatics. In this study, improvement of a Gibbs sa...
Kazuhito Shida
IPPS
2009
IEEE
15 years 8 months ago
Improving RDMA-based MPI eager protocol for frequently-used buffers
MPI is the main standard for communication in high-performance clusters. MPI implementations use the Eager protocol to transfer small messages. To avoid the cost of memory registr...
Mohammad J. Rashti, Ahmad Afsahi
PAMI
2012
13 years 4 months ago
A Least-Squares Framework for Component Analysis
— Over the last century, Component Analysis (CA) methods such as Principal Component Analysis (PCA), Linear Discriminant Analysis (LDA), Canonical Correlation Analysis (CCA), Lap...
Fernando De la Torre
SDM
2009
SIAM
149views Data Mining» more  SDM 2009»
15 years 11 months ago
Speeding Up Secure Computations via Embedded Caching.
Most existing work on Privacy-Preserving Data Mining (PPDM) focus on enabling conventional data mining algorithms with the ability to run in a secure manner in a multi-party setti...
K. Zhai, W. K. Ng, A. R. Herianto, S. Han