Sciweavers

402 search results - page 43 / 81
» Cryptosystems using Linear Groups
Sort
View
CP
2005
Springer
15 years 3 months ago
Breaking All Value Symmetries in Surjection Problems
We propose a surprisingly simple new way of breaking all value symmetries with constraints. Our method requires the addition of one variable per value of the problem plus a linear ...
Jean-Francois Puget
CSB
2005
IEEE
205views Bioinformatics» more  CSB 2005»
15 years 3 months ago
Fractal Clustering for Microarray Data Analysis
DNA microarray experiments generate a substantial amount of information about global gene expression. Gene expression profiles can be represented as points in multi-dimensional sp...
Lu-Yong Wang, Ammaiappan Balasubramanian, Amit Cha...
CSB
2005
IEEE
145views Bioinformatics» more  CSB 2005»
15 years 3 months ago
Classification Methods for HIV-1 Medicated Neuronal Damage
HIV-1-associated dementia (HAD) is the most devastating disease happened in the central nervous system of AIDS patients. Neuronal damage, the early indicator of HAD, under differe...
Mengjun Wang, Jialin Zheng, Zhengxin Chen, Yong Sh...
ECCV
2006
Springer
15 years 12 months ago
Algebraic Methods for Direct and Feature Based Registration of Diffusion Tensor Images
Abstract. We present an algebraic solution to both direct and featurebased registration of diffusion tensor images under various local deformation models. In the direct case, we sh...
Alvina Goh, René Vidal
ISSAC
2007
Springer
83views Mathematics» more  ISSAC 2007»
15 years 4 months ago
Parallel computation of the rank of large sparse matrices from algebraic K-theory
This paper deals with the computation of the rank and some integer Smith forms of a series of sparse matrices arising in algebraic K-theory. The number of non zero entries in the ...
Jean-Guillaume Dumas, Philippe Elbaz-Vincent, Pasc...