Sciweavers

217 search results - page 31 / 44
» Selecting Cryptographic Key Sizes
Sort
View
RECOMB
2002
Springer
16 years 2 months ago
String barcoding: uncovering optimal virus signatures
There are many critical situations when one needs to rapidly identify an unidentified pathogen from among a given set of previously sequenced pathogens. DNA or RNA hybridization c...
Sam Rash, Dan Gusfield
RECOMB
2008
Springer
16 years 2 months ago
Constructing Treatment Portfolios Using Affinity Propagation
A key problem of interest to biologists and medical researchers is the selection of a subset of queries or treatments that provide maximum utility for a population of targets. For ...
Delbert Dueck, Brendan J. Frey, Nebojsa Jojic, Vla...
PRL
2007
154views more  PRL 2007»
15 years 1 months ago
Regularized mixture discriminant analysis
Abstract – In this paper we seek a Gaussian mixture model (GMM) of the classconditional densities for plug-in Bayes classification. We propose a method for setting the number of ...
Zohar Halbe, Mayer Aladjem
186
Voted
CIVR
2007
Springer
254views Image Analysis» more  CIVR 2007»
15 years 5 months ago
Soccer players identification based on visual local features
Semantic detection and recognition of objects and events contained in a video stream has to be performed in order to provide content-based annotation and retrieval of videos. This...
Lamberto Ballan, Marco Bertini, Alberto Del Bimbo,...
SACRYPT
2007
Springer
15 years 8 months ago
Two Trivial Attacks on Trivium
Trivium is a stream cipher designed in 2005 by C. De Canni`ere and B. Preneel for the European project eSTREAM. It has successfully passed the first phase of the project and has ...
Alexander Maximov, Alex Biryukov