Sciweavers

1050 search results - page 126 / 210
» Two methods of authenticated positioning
Sort
View
BMCBI
2005
113views more  BMCBI 2005»
15 years 1 months ago
Normal uniform mixture differential gene expression detection for cDNA microarrays
Background: One of the primary tasks in analysing gene expression data is finding genes that are differentially expressed in different samples. Multiple testing issues due to the ...
Nema Dean, Adrian E. Raftery
ISBI
2006
IEEE
16 years 2 months ago
A diffusion tensor imaging tractography algorithm based on Navier-Stokes fluid mechanics
We introduce a method for estimating regional connectivity in diffusion tensor magnetic resonance imaging (DT-MRI) based on a fluid mechanics model. We customize the Navier-Stokes...
Nathan S. Hageman, David W. Shattuck, Katherine Na...
ESORICS
2009
Springer
15 years 8 months ago
A Quantitative Analysis of Indistinguishability for a Continuous Domain Biometric Cryptosystem
Abstract. Biometric information is regarded as highly sensitive information and therefore encryption techniques for biometric information are needed to address security and privacy...
Ileana Buhan, Jeroen Breebaart, Jorge Guajardo, Ko...
ECCV
2004
Springer
15 years 7 months ago
Biometric Sensor Interoperability: A Case Study in Fingerprints
The problem of biometric sensor interoperability has received limited attention in the literature. Most biometric systems operate under the assumption that the data (viz., images) ...
Arun Ross, Anil K. Jain
JUCS
2008
147views more  JUCS 2008»
15 years 1 months ago
Security and Usability Aspects of Man-in-the-Middle Attacks on ZRTP
Abstract: ZRTP is a protocol designed to set up a shared secret between two communication parties which is subsequently used to secure the media stream (i.e. the audio data) of a V...
Martin Petraschek, Thomas Hoeher, Oliver Jung, Hel...