Sciweavers

819 search results - page 106 / 164
» Using Assumptions to Distribute CTL Model Checking
Sort
View
EUROCRYPT
2005
Springer
15 years 6 months ago
Secure Remote Authentication Using Biometric Data
Biometric data offer a potential source of high-entropy, secret information that can be used in cryptographic protocols provided two issues are addressed: (1) biometric data are n...
Xavier Boyen, Yevgeniy Dodis, Jonathan Katz, Rafai...
95
Voted
IPMI
2005
Springer
16 years 1 months ago
Computational Elastography from Standard Ultrasound Image Sequences by Global Trust Region Optimization
Abstract. A new approach is proposed to estimate the spatial distribution of shear modulus of tissues in-vivo. An image sequence is acquired using a standard medical ultrasound sca...
Jan Kybic, Daniel Smutek
105
Voted
CSDA
2006
95views more  CSDA 2006»
15 years 20 days ago
Identifying influential multinomial observations by perturbation
The assessment of the influence of individual observations on the outcome of the analysis by perturbation has received a lot of attention for situations in which the observations ...
S. O. Nyangoma, W.-K. Fung, R. C. Jansen
93
Voted
WSC
2000
15 years 2 months ago
Variance reduction techniques for value-at-risk with heavy-tailed risk factors
The calculation of value-at-risk (VAR) for large portfolios of complex instruments is among the most demanding and widespread computational challenges facing the financial industr...
Paul Glasserman, Philip Heidelberger, Perwez Shaha...
106
Voted
NIPS
2003
15 years 2 months ago
Kernel Dimensionality Reduction for Supervised Learning
We propose a novel method of dimensionality reduction for supervised learning. Given a regression or classification problem in which we wish to predict a variable Y from an expla...
Kenji Fukumizu, Francis R. Bach, Michael I. Jordan