Sciweavers

708 search results - page 120 / 142
» Computational Law
Sort
View
TDP
2008
111views more  TDP 2008»
14 years 9 months ago
Statistical Disclosure Control for Microdata Using the R-Package sdcMicro
The demand for high quality microdata for analytical purposes has grown rapidly among researchers and the public over the last few years. In order to respect existing laws on data ...
Matthias Templ
BIOINFORMATICS
2002
146views more  BIOINFORMATICS 2002»
14 years 9 months ago
A duplication growth model of gene expression networks
Motivation: There has been considerable interest in developing computational techniques for inferring genetic regulatory networks from whole-genome expression profiles. When expre...
Ashish Bhan, David J. Galas, T. Gregory Dewey
IJCV
2000
132views more  IJCV 2000»
14 years 9 months ago
2 1/2 D Visual Servoing with Respect to Unknown Objects Through a New Estimation Scheme of Camera Displacement
Classical visual servoing techniques need a strong a priori knowledge of the shape and the dimensions of the observed objects. In this paper, we present how the 2 1/2 D visual serv...
Ezio Malis, François Chaumette
PAMI
2002
136views more  PAMI 2002»
14 years 9 months ago
On the Individuality of Fingerprints
Fingerprint identification is based on two basic premises: (i) persistence: the basic characteristics of fingerprints do not change with time; and (ii) individuality: the fingerpr...
Sharath Pankanti, Salil Prabhakar, Anil K. Jain
CIKM
2010
Springer
14 years 8 months ago
Understanding retweeting behaviors in social networks
Retweeting is an important action (behavior) on Twitter, indicating the behavior that users re-post microblogs of their friends. While much work has been conducted for mining text...
Zi Yang, Jingyi Guo, Keke Cai, Jie Tang, Juanzi Li...