Sciweavers

54 search results - page 10 / 11
» On the Analysis of Linear Probing Hashing
Sort
View
115
Voted
TIFS
2008
157views more  TIFS 2008»
14 years 9 months ago
Subspace Approximation of Face Recognition Algorithms: An Empirical Study
We present a theory for constructing linear subspace approximations to face-recognition algorithms and empirically demonstrate that a surprisingly diverse set of face-recognition a...
Pranab Mohanty, Sudeep Sarkar, Rangachar Kasturi, ...
BMCBI
2008
145views more  BMCBI 2008»
14 years 9 months ago
Mapping gene expression quantitative trait loci by singular value decomposition and independent component analysis
Background: The combination of gene expression profiling with linkage analysis has become a powerful paradigm for mapping gene expression quantitative trait loci (eQTL). To date, ...
Shameek Biswas, John D. Storey, Joshua M. Akey
85
Voted
BMCBI
2005
67views more  BMCBI 2005»
14 years 9 months ago
Sequence signature analysis of chromosome identity in three Drosophila species
Background: All eukaryotic organisms need to distinguish each of their chromosomes. A few protein complexes have been described that recognise entire, specific chromosomes, for in...
Per Stenberg, Fredrik Pettersson, Anja O. Saura, A...
MICCAI
2003
Springer
15 years 10 months ago
Freehand Ultrasound Reconstruction Based on ROI Prior Modeling and Normalized Convolution
3D freehand ultrasound imaging is becoming a widespread technique in medical examinations. This imaging technique produces a set of irregularly spaced B-scans. Reconstructing a reg...
Raúl San José Estépar, Marcos...
CRYPTO
2009
Springer
166views Cryptology» more  CRYPTO 2009»
15 years 4 months ago
Public-Key Cryptosystems Resilient to Key Leakage
Most of the work in the analysis of cryptographic schemes is concentrated in abstract adversarial models that do not capture side-channel attacks. Such attacks exploit various for...
Moni Naor, Gil Segev