Sciweavers

1814 search results - page 328 / 363
» Watermarking relational data: framework, algorithms and anal...
Sort
View
ATAL
2009
Springer
15 years 5 months ago
Computing optimal randomized resource allocations for massive security games
Predictable allocations of security resources such as police officers, canine units, or checkpoints are vulnerable to exploitation by attackers. Recent work has applied game-theo...
Christopher Kiekintveld, Manish Jain, Jason Tsai, ...
PAMI
2006
186views more  PAMI 2006»
14 years 11 months ago
Performance Evaluation of Fingerprint Verification Systems
This paper is concerned with the performance evaluation of fingerprint verification systems. After an initial classification of biometric testing initiatives, we explore both the t...
Raffaele Cappelli, Dario Maio, Davide Maltoni, Jam...
74
Voted
LREC
2008
108views Education» more  LREC 2008»
15 years 15 days ago
Design of a Multimodal Database for Research on Automatic Detection of Severe Apnoea Cases
The aim of this paper is to present the design of a multimodal database suitable for research on new possibilities for automatic diagnosis of patients with severe obstructive slee...
Rubén Fernández Pozo, Luis A. Hern&a...
TIT
1998
99views more  TIT 1998»
14 years 10 months ago
Information-Theoretic Image Formation
—The emergent role of information theory in image formation is surveyed. Unlike the subject of information-theoretic communication theory, information-theoretic imaging is far fr...
Joseph A. O'Sullivan, Richard E. Blahut, Donald L....
BMCBI
2007
154views more  BMCBI 2007»
14 years 11 months ago
Inferring biological networks with output kernel trees
Background: Elucidating biological networks between proteins appears nowadays as one of the most important challenges in systems biology. Computational approaches to this problem ...
Pierre Geurts, Nizar Touleimat, Marie Dutreix, Flo...