Sciweavers

7121 search results - page 1368 / 1425
» Modeling Signs Using Functional Data Analysis
Sort
View
CCS
2008
ACM
15 years 3 months ago
Towards practical biometric key generation with randomized biometric templates
Although biometrics have garnered significant interest as a source of entropy for cryptographic key generation, recent studies indicate that many biometric modalities may not actu...
Lucas Ballard, Seny Kamara, Fabian Monrose, Michae...
BIOCOMP
2008
15 years 2 months ago
Identifying Protein Flexibility by NMA
- Here proposed apriori method for identification of protein flexibility relies on one end-state conformation of the protein. This method has comparative advantage over many others...
Kresimir Sikic, Branko Jeren, Sanja Tomic
PRL
2006
78views more  PRL 2006»
15 years 1 months ago
The interaction between classification and reject performance for distance-based reject-option classifiers
Consider the class of problems in which a target class is well-defined, and an outlier class is ill-defined. In these cases new outlier classes can appear, or the class-conditiona...
Thomas Landgrebe, David M. J. Tax, Pavel Pacl&iacu...
CORR
2010
Springer
114views Education» more  CORR 2010»
14 years 11 months ago
Efficiently Discovering Hammock Paths from Induced Similarity Networks
ty networks are important abstractions in many information management applications such as recommender systems, corpora analysis, and medical informatics. For instance, in a recom...
M. Shahriar Hossain, Michael Narayan, Naren Ramakr...
SOCIALCOM
2010
14 years 11 months ago
Want to be Retweeted? Large Scale Analytics on Factors Impacting Retweet in Twitter Network
Retweeting is the key mechanism for information diffusion in Twitter. It emerged as a simple yet powerful way of disseminating information in the Twitter social network. Even thoug...
Bongwon Suh, Lichan Hong, Peter Pirolli, Ed H. Chi
« Prev « First page 1368 / 1425 Last » Next »