Sciweavers

5891 search results - page 1176 / 1179
» On the Computational Security of a Distributed Key Distribut...
Sort
View
CPHYSICS
2007
71views more  CPHYSICS 2007»
14 years 9 months ago
Simulation of n-qubit quantum systems. III. Quantum operations
During the last decade, several quantum information protocols, such as quantum key distribution, teleportation or quantum computation, have attracted a lot of interest. Despite th...
T. Radtke, S. Fritzsche
PAMI
2008
216views more  PAMI 2008»
14 years 9 months ago
Annotating Images by Mining Image Search Results
Although it has been studied for years by the computer vision and machine learning communities, image annotation is still far from practical. In this paper, we propose a novel atte...
Xin-Jing Wang, Lei Zhang 0001, Xirong Li, Wei-Ying...
85
Voted
BMCBI
2004
265views more  BMCBI 2004»
14 years 9 months ago
ASAView: Database and tool for solvent accessibility representation in proteins
Background: Accessible surface area (ASA) or solvent accessibility of amino acids in a protein has important implications. Knowledge of surface residues helps in locating potentia...
Shandar Ahmad, M. Michael Gromiha, Hamed Fawareh, ...
85
Voted
JAL
2002
113views more  JAL 2002»
14 years 9 months ago
A multivariate view of random bucket digital search trees
We take a multivariate view of digital search trees by studying the number of nodes of different types that may coexist in a bucket digital search tree as it grows under an arbitr...
Friedrich Hubalek, Hsien-Kuei Hwang, William Lew, ...
SIAMSC
2010
141views more  SIAMSC 2010»
14 years 7 months ago
An Iterative Method for Edge-Preserving MAP Estimation When Data-Noise Is Poisson
In numerous applications of image processing, e.g. astronomical and medical imaging, data-noise is well-modeled by a Poisson distribution. This motivates the use of the negative-lo...
Johnathan M. Bardsley, John Goldes
« Prev « First page 1176 / 1179 Last » Next »