Sciweavers

8080 search results - page 1463 / 1616
» From Computer Networks to Agent Networks
Sort
View
BMCBI
2006
117views more  BMCBI 2006»
15 years 4 months ago
The Cluster Variation Method for Efficient Linkage Analysis on Extended Pedigrees
Background: Computing exact multipoint LOD scores for extended pedigrees rapidly becomes infeasible as the number of markers and untyped individuals increase. When markers are exc...
Cornelis A. Albers, Martijn A. R. Leisink, Hilbert...
DSRT
2006
IEEE
15 years 10 months ago
Grid-enabling FIRST: Speeding Up Simulation Applications Using WinGrid
The vision of grid computing is to make computational power, storage capacity, data and applications available to users as readily as electricity and other utilities. Grid infrast...
Navonil Mustafee, Anders Alstad, Bjorn Larsen, Sim...
CCS
2009
ACM
15 years 8 months ago
TruWallet: trustworthy and migratable wallet-based web authentication
Identity theft has fostered to a major security problem on the Internet, in particular stealing passwords for web applications through phishing and malware. We present TruWallet, ...
Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadegh...
TIP
2008
144views more  TIP 2008»
15 years 4 months ago
Incremental Refinement of Image Salient-Point Detection
Low-level image analysis systems typically detect "points of interest", i.e., areas of natural images that contain corners or edges. Most of the robust and computationall...
Yiannis Andreopoulos, Ioannis Patras
TIT
2010
138views Education» more  TIT 2010»
14 years 10 months ago
Functional compression through graph coloring
Motivated by applications to sensor networks and privacy preserving databases, we consider the problem of functional compression. The objective is to separately compress possibly c...
Vishal Doshi, Devavrat Shah, Muriel Médard,...
« Prev « First page 1463 / 1616 Last » Next »