Sciweavers

998 search results - page 64 / 200
» From Feasible Proofs to Feasible Computations
Sort
View
105
Voted
CRYPTO
2012
Springer
223views Cryptology» more  CRYPTO 2012»
13 years 4 months ago
Collusion-Preserving Computation
In collusion-free protocols, subliminal communication is impossible and parties are thus unable to communicate “any information beyond what the protocol allows”. Collusion-fre...
Joël Alwen, Jonathan Katz, Ueli Maurer, Vassi...
IMC
2007
ACM
15 years 3 months ago
Learning network structure from passive measurements
The ability to discover network organization, whether in the form of explicit topology reconstruction or as embeddings that approximate topological distance, is a valuable tool. T...
Brian Eriksson, Paul Barford, Robert Nowak, Mark C...
ICRA
2009
IEEE
178views Robotics» more  ICRA 2009»
15 years 8 months ago
Camera self-calibration for sequential Bayesian structure from motion
— Computer vision researchers have proved the feasibility of camera self-calibration —the estimation of a camera’s internal parameters from an image sequence without any know...
Javier Civera, Diana R. Bueno, Andrew J. Davison, ...
BMCBI
2008
135views more  BMCBI 2008»
15 years 1 months ago
Identification of a small optimal subset of CpG sites as bio-markers from high-throughput DNA methylation profiles
Background: DNA methylation patterns have been shown to significantly correlate with different tissue types and disease states. High-throughput methylation arrays enable large-sca...
Hailong Meng, Edward Lenn Murrelle, Guoya Li
CIKM
2006
Springer
15 years 5 months ago
Mining compressed commodity workflows from massive RFID data sets
Radio Frequency Identification (RFID) technology is fast becoming a prevalent tool in tracking commodities in supply chain management applications. The movement of commodities thr...
Hector Gonzalez, Jiawei Han, Xiaolei Li