Sciweavers

1640 search results - page 108 / 328
» Deriving Private Information from Randomized Data
Sort
View
BMCBI
2010
112views more  BMCBI 2010»
14 years 10 months ago
PhenoFam-gene set enrichment analysis through protein structural information
Background: With the current technological advances in high-throughput biology, the necessity to develop tools that help to analyse the massive amount of data being generated is e...
Maciej Paszkowski-Rogacz, Mikolaj Slabicki, M. Ter...
ICB
2007
Springer
79views Biometrics» more  ICB 2007»
15 years 4 months ago
On Some Performance Indices for Biometric Identification System
This paper investigates a new approach to formulate performance indices of biometric system using information theoretic models. The performance indices proposed here (unlike conven...
Jay Bhatnagar, Ajay Kumar
ICB
2009
Springer
173views Biometrics» more  ICB 2009»
14 years 7 months ago
Bayesian Networks to Combine Intensity and Color Information in Face Recognition
We present generative models dedicated to face recognition. Our models consider data extracted from color face images and use Bayesian Networks to model relationships between diffe...
Guillaume Heusch, Sébastien Marcel
TASLP
2008
140views more  TASLP 2008»
14 years 10 months ago
Acoustic Chord Transcription and Key Extraction From Audio Using Key-Dependent HMMs Trained on Synthesized Audio
We describe an acoustic chord transcription system that uses symbolic data to train hidden Markov models and gives best-of-class frame-level recognition results. We avoid the extre...
Kyogu Lee, Malcolm Slaney
IEEEARES
2010
IEEE
15 years 3 months ago
Detection of Spyware by Mining Executable Files
Spyware represents a serious threat to confidentiality since it may result in loss of control over private data for computer users. This type of software might collect the data and...
Raja Khurram Shahzad, Syed Imran Haider, Niklas La...