Sciweavers

2504 search results - page 373 / 501
» Methods for comparing rankings of search engine results
Sort
View
CARDIS
2008
Springer
105views Hardware» more  CARDIS 2008»
15 years 3 months ago
Fast Hash-Based Signatures on Constrained Devices
Digital signatures are one of the most important applications of microprocessor smart cards. The most widely used algorithms for digital signatures, RSA and ECDSA, depend on finite...
Sebastian Rohde, Thomas Eisenbarth, Erik Dahmen, J...
TASLP
2011
14 years 8 months ago
Tempo Detection Using a Hybrid Multiband Approach
—In this paper, a novel tempo detection system is presented, which suggests the use of a hybrid multiband decomposition. The model tracks the periodicities of different signal pr...
Mikel Gainza, Eugene Coyle
PAMI
2012
13 years 4 months ago
Probabilistic Models for Inference about Identity
—Many face recognition algorithms use “distance-based” methods: Feature vectors are extracted from each face and distances in feature space are compared to determine matches....
Simon Prince, Peng Li, Yun Fu, Umar Mohammed, Jame...
BMCBI
2006
92views more  BMCBI 2006»
15 years 1 months ago
A jumping profile Hidden Markov Model and applications to recombination sites in HIV and HCV genomes
Background: Jumping alignments have recently been proposed as a strategy to search a given multiple sequence alignment A against a database. Instead of comparing a database sequen...
Anne-Kathrin Schultz, Ming Zhang, Thomas Leitner, ...
CSE
2009
IEEE
15 years 8 months ago
Web Science 2.0: Identifying Trends through Semantic Social Network Analysis
—We introduce a novel set of social network analysis based algorithms for mining the Web, blogs, and online forums to identify trends and find the people launching these new tren...
Peter A. Gloor, Jonas Krauss, Stefan Nann, Kai Fis...