Sciweavers

341 search results - page 26 / 69
» Permeability Analysis based on information granulation theor...
Sort
View
CIMAGING
2008
165views Hardware» more  CIMAGING 2008»
14 years 11 months ago
Multimodal unbiased image matching via mutual information
In the past decade, information theory has been studied extensively in computational imaging. In particular, image matching by maximizing mutual information has been shown to yiel...
Igor Yanovsky, Paul M. Thompson, Stanley Osher, Al...
BMCBI
2010
110views more  BMCBI 2010»
14 years 10 months ago
TimeDelay-ARACNE: Reverse engineering of gene networks from time-course data by an information theoretic approach
Background: One of main aims of Molecular Biology is the gain of knowledge about how molecular components interact each other and to understand gene function regulations. Using mi...
Pietro Zoppoli, Sandro Morganella, Michele Ceccare...
CCS
2009
ACM
15 years 4 months ago
On non-cooperative location privacy: a game-theoretic analysis
In mobile networks, authentication is a required primitive of the majority of security protocols. However, an adversary can track the location of mobile nodes by monitoring pseudo...
Julien Freudiger, Mohammad Hossein Manshaei, Jean-...
HICSS
2002
IEEE
89views Biometrics» more  HICSS 2002»
15 years 2 months ago
ICT-Impact on Services
The state of service management practice and the developments in ICT-efficiency research prompt the call for managerial relevance, normative theory building and the conceptualizat...
Alexander G. Bielowski, Rita Walczuch
SISAP
2010
IEEE
243views Data Mining» more  SISAP 2010»
14 years 7 months ago
Similarity matrix compression for efficient signature quadratic form distance computation
Determining similarities among multimedia objects is a fundamental task in many content-based retrieval, analysis, mining, and exploration applications. Among state-of-the-art sim...
Christian Beecks, Merih Seran Uysal, Thomas Seidl