Sciweavers

5695 search results - page 1017 / 1139
» Using Many Cameras as One
Sort
View
TCC
2007
Springer
86views Cryptology» more  TCC 2007»
15 years 4 months ago
Weakly-Private Secret Sharing Schemes
Abstract. Secret-sharing schemes are an important tool in cryptography that is used in the construction of many secure protocols. However, the shares’ size in the best known secr...
Amos Beimel, Matthew K. Franklin
CCECE
2006
IEEE
15 years 4 months ago
A QoS Mapping Rule Builder
Although many QoS management architectures have been recently introduced with a lot of advanced features, they have never been widely used in the existing applications due to the ...
Kim Khoa Nguyen, Brigitte Kerhervé, Brigitt...
CCECE
2006
IEEE
15 years 4 months ago
Survey of Biological High Performance Computing: Algorithms, Implementations and Outlook Research
During recent years there has been an explosive growth of biological data coming from genome projects, proteomics, protein structure determination, and the rapid expansion in digi...
Nasreddine Hireche, J. M. Pierre Langlois, Gabriel...
ICDM
2006
IEEE
100views Data Mining» more  ICDM 2006»
15 years 4 months ago
Meta Clustering
Clustering is ill-defined. Unlike supervised learning where labels lead to crisp performance criteria such as accuracy and squared error, clustering quality depends on how the cl...
Rich Caruana, Mohamed Farid Elhawary, Nam Nguyen, ...
IMSCCS
2006
IEEE
15 years 4 months ago
Clustering of Gene Expression Data: Performance and Similarity Analysis
Background: DNA Microarray technology is an innovative methodology in experimental molecular biology, which has produced huge amounts of valuable data in the profile of gene expre...
Longde Yin, Chun-Hsi Huang
« Prev « First page 1017 / 1139 Last » Next »