Sciweavers

56 search results - page 3 / 12
» Configuration Independent Analysis for Characterizing Shared...
Sort
View
207
Voted
ICDE
2005
IEEE
100views Database» more  ICDE 2005»
16 years 2 months ago
Configurable Security Protocols for Multi-party Data Analysis with Malicious Participants
Standard multi-party computation models assume semi-honest behavior, where the majority of participants implement protocols according to specification, an assumption not always pl...
Bradley Malin, Edoardo Airoldi, Samuel Edoho-Eket,...
111
Voted
ICPR
2006
IEEE
16 years 2 months ago
Texture Segmentation Using Independent Component Analysis of Gabor Features
This paper proposes a novel method for texture segmentation using independent component analysis (ICA) of Gabor features (called ICAG). It has three distinguished aspects. (1) Gab...
Yang Chen, Runsheng Wang
117
Voted
PAMI
2007
127views more  PAMI 2007»
15 years 19 days ago
Text-Independent Writer Identification and Verification Using Textural and Allographic Features
—The identification of a person on the basis of scanned images of handwriting is a useful biometric modality with application in forensic and historic document analysis and const...
Marius Bulacu, Lambert Schomaker
105
Voted
BMCBI
2008
158views more  BMCBI 2008»
15 years 1 months ago
Analyzing M-CSF dependent monocyte/macrophage differentiation: Expression modes and meta-modes derived from an independent compo
Background: The analysis of high-throughput gene expression data sets derived from microarray experiments still is a field of extensive investigation. Although new approaches and ...
Dominik Lutter, Peter Ugocsai, Margot Grandl, Evel...
155
Voted
ISPASS
2008
IEEE
15 years 7 months ago
An Analysis of I/O And Syscalls In Critical Sections And Their Implications For Transactional Memory
Transactional memory (TM) is a scalable and concurrent way to build atomic sections. One aspect of TM that remains unclear is how side-effecting operations – that is, those whic...
Lee Baugh, Craig B. Zilles