Sciweavers

2392 search results - page 418 / 479
» Matching data dissemination algorithms to application requir...
Sort
View
ISAAC
2010
Springer
276views Algorithms» more  ISAAC 2010»
14 years 9 months ago
Anonymous Fuzzy Identity-Based Encryption for Similarity Search
Abstract. In this paper, we consider the problem of predicate encryption and focus on the predicate for testing whether the hamming distance between the attribute X of a data item ...
David W. Cheung, Nikos Mamoulis, W. K. Wong, Siu-M...
ICML
2006
IEEE
16 years 19 days ago
Constructing informative priors using transfer learning
Many applications of supervised learning require good generalization from limited labeled data. In the Bayesian setting, we can try to achieve this goal by using an informative pr...
Rajat Raina, Andrew Y. Ng, Daphne Koller
VLSID
2005
IEEE
147views VLSI» more  VLSID 2005»
16 years 6 days ago
Memory-Centric Motion Estimator
In the streaming video processing domain, the only way to meet strict performance and quality requirements and yet to provide the area- and power-wise optimal platform is to apply...
Aleksandar Beric, Ramanathan Sethuraman, Jef L. va...
ICMCS
2006
IEEE
147views Multimedia» more  ICMCS 2006»
15 years 5 months ago
A Secret Key Based Multiscale Fragile Watermark in the Wavelet Domain
The distribution of the wavelet coefficients in 2-D discrete wavelet transform (DWT) subspaces can be well described by a Gaussian mixture statistical model. In this paper, a secr...
Hua Yuan, Xiao-Ping Zhang
CBMS
2005
IEEE
15 years 5 months ago
Grid Computing in 3D-EM Image Processing Using Xmipp
Image processing in three-dimensional electron microscopy (3D-EM) is characterized by large amounts of data, and voluminous computing requirements. Here, we report our first exper...
Sjors H. W. Scheres, A. J. Merino, Carlos Oscar S&...