Sciweavers

2190 search results - page 280 / 438
» Learning Relations Using Collocations
Sort
View
170
Voted
TCC
2007
Springer
170views Cryptology» more  TCC 2007»
15 years 8 months ago
Secure Linear Algebra Using Linearly Recurrent Sequences
In this work we present secure two-party protocols for various core problems in linear algebra. Our main result is a protocol to obliviously decide singularity of an encrypted matr...
Eike Kiltz, Payman Mohassel, Enav Weinreb, Matthew...
CVPR
2008
IEEE
16 years 4 months ago
Trajectory analysis and semantic region modeling using a nonparametric Bayesian model
We propose a novel nonparametric Bayesian model, Dual Hierarchical Dirichlet Processes (Dual-HDP), for trajectory analysis and semantic region modeling in surveillance settings, i...
Xiaogang Wang, Keng Teck Ma, Gee Wah Ng, W. Eric L...
133
Voted
CIKM
2009
Springer
15 years 7 months ago
An empirical study on using hidden markov model for search interface segmentation
This paper describes a hidden Markov model (HMM) based approach to perform search interface segmentation. Automatic processing of an interface is a must to access the invisible co...
Ritu Khare, Yuan An
143
Voted
BMCBI
2006
172views more  BMCBI 2006»
15 years 2 months ago
A novel scoring schema for peptide identification by searching protein sequence databases using tandem mass spectrometry data
Background: Tandem mass spectrometry (MS/MS) is a powerful tool for protein identification. Although great efforts have been made in scoring the correlation between tandem mass sp...
Zhuo Zhang, Shiwei Sun, Xiaopeng Zhu, Suhua Chang,...
206
Voted
IJCV
2007
363views more  IJCV 2007»
15 years 2 months ago
Image Analysis and Reconstruction using a Wavelet Transform Constructed from a Reducible Representation of the Euclidean Motion
Abstract. Inspired by the early visual system of many mammalians we consider the construction of-and reconstruction from- an orientation score Uf : R2 ×S1 → C as a local orienta...
Remco Duits, Michael Felsberg, Gösta H. Granl...