Sciweavers

19174 search results - page 3791 / 3835
» Computer Animation Techniques
Sort
View
BMCBI
2007
153views more  BMCBI 2007»
15 years 3 months ago
Analysis of nanopore detector measurements using Machine-Learning methods, with application to single-molecule kinetic analysis
Background: A nanopore detector has a nanometer-scale trans-membrane channel across which a potential difference is established, resulting in an ionic current through the channel ...
Matthew Landry, Stephen Winters-Hilt
CN
2007
141views more  CN 2007»
15 years 3 months ago
Identifying lossy links in wired/wireless networks by exploiting sparse characteristics
In this paper, we consider the problem of estimating link loss rates based on end-to-end path loss rates in order to identify lossy links on the network. We first derive a maximu...
Hyuk Lim, Jennifer C. Hou
IOR
2008
126views more  IOR 2008»
15 years 3 months ago
Fast Simulation of Multifactor Portfolio Credit Risk
This paper develops rare event simulation methods for the estimation of portfolio credit risk -- the risk of losses to a portfolio resulting from defaults of assets in the portfol...
Paul Glasserman, Wanmo Kang, Perwez Shahabuddin
IJCV
2006
299views more  IJCV 2006»
15 years 3 months ago
Graph Cuts and Efficient N-D Image Segmentation
Combinatorial graph cut algorithms have been successfully applied to a wide range of problems in vision and graphics. This paper focusses on possibly the simplest application of gr...
Yuri Boykov, Gareth Funka-Lea
IJDE
2006
95views more  IJDE 2006»
15 years 3 months ago
Exploiting the Rootkit Paradox with Windows Memory Analysis
Rootkits are malicious programs that silently subvert an operating system to hide an intruder's activities. Although there are a number of tools designed to detect rootkits, ...
Jesse D. Kornblum
« Prev « First page 3791 / 3835 Last » Next »