Sciweavers

1888 search results - page 289 / 378
» Information Distance
Sort
View
SP
2008
IEEE
100views Security Privacy» more  SP 2008»
15 years 11 months ago
Towards Practical Privacy for Genomic Computation
Many basic tasks in computational biology involve operations on individual DNA and protein sequences. These sequences, even when anonymized, are vulnerable to re-identification a...
Somesh Jha, Louis Kruger, Vitaly Shmatikov
CIDM
2007
IEEE
15 years 11 months ago
Mining Subspace Correlations
— In recent applications of clustering such as gene expression microarray analysis, collaborative filtering, and web mining, object similarity is no longer measured by physical ...
Rave Harpaz, Robert M. Haralick
CIRA
2007
IEEE
151views Robotics» more  CIRA 2007»
15 years 11 months ago
Image Clustering Using Visual and Text Keywords
Abstract—In classical image classification approaches, lowlevel features have been used. But the high dimensionality of feature spaces poses a challenge in terms of feature selec...
Rajeev Agrawal, Changhua Wu, William I. Grosky, Fa...
CISS
2007
IEEE
15 years 11 months ago
Relay Placement and Movement Control for Realization of Fault-Tolerant Ad Hoc Networks
— Wireless communication is a critical component of battlefield networks. Nodes in a battlefield network exist in hostile environments and thus fault-tolerance against node and...
Abhishek Kashyap, Mark A. Shayman
123
Voted
DFT
2007
IEEE
142views VLSI» more  DFT 2007»
15 years 11 months ago
Quantitative Analysis of In-Field Defects in Image Sensor Arrays
Growth of pixel density and sensor array size increases the likelihood of developing in-field pixel defects. An ongoing study on defect development in imagers has now provided us ...
Jenny Leung, Jozsef Dudas, Glenn H. Chapman, Israe...