Sciweavers

3210 search results - page 75 / 642
» Secure Similarity Search
Sort
View
175
Voted
BMCBI
2004
162views more  BMCBI 2004»
15 years 4 months ago
Identifying spatially similar gene expression patterns in early stage fruit fly embryo images: binary feature versus invariant m
Background: Modern developmental biology relies heavily on the analysis of embryonic gene expression patterns. Investigators manually inspect hundreds or thousands of expression p...
Rajalakshmi Gurunathan, Bernard Van Emden, Sethura...
ESAS
2007
Springer
15 years 8 months ago
The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams
Secure communication over wireless channels necessitates authentication of communication partners to prevent man-in-the-middle attacks. For spontaneous interaction between independ...
Rene Mayrhofer
ICDE
2008
IEEE
152views Database» more  ICDE 2008»
16 years 6 months ago
Efficient Merging and Filtering Algorithms for Approximate String Searches
We study the following problem: how to efficiently find in a collection of strings those similar to a given query string? Various similarity functions can be used, such as edit dis...
Chen Li, Jiaheng Lu, Yiming Lu
136
Voted
SSDBM
2010
IEEE
117views Database» more  SSDBM 2010»
15 years 9 months ago
Finding Top-k Similar Pairs of Objects Annotated with Terms from an Ontology
With the growing focus on semantic searches and interpretations, an increasing number of standardized vocabularies and ontologies are being designed and used to describe data. We ...
Arnab Bhattacharya, Abhishek Bhowmick, Ambuj K. Si...
PAMI
2006
206views more  PAMI 2006»
15 years 4 months ago
Fast Active Appearance Model Search Using Canonical Correlation Analysis
A fast AAM search algorithm based on canonical correlation analysis (CCA-AAM) is introduced. It efficiently models the dependency between texture residuals and model parameters dur...
Rene Donner, Michael Reiter, Georg Langs, Philipp ...