Sciweavers

178 search results - page 35 / 36
» An Analysis of (Linear) Exponentials Based on Extended Seque...
Sort
View
NIPS
2007
13 years 7 months ago
Receptive Fields without Spike-Triggering
Stimulus selectivity of sensory neurons is often characterized by estimating their receptive field properties such as orientation selectivity. Receptive fields are usually deriv...
Jakob Macke, Guenther Zeck, Matthias Bethge
SAS
2009
Springer
281views Formal Methods» more  SAS 2009»
14 years 6 months ago
A Verifiable, Control Flow Aware Constraint Analyzer for Bounds Check Elimination
The Java programming language requires that out-of-bounds array accesses produce runtime exceptions. In general, this requires a dynamic bounds check each time an array element is...
David Niedzielski, Jeffery von Ronne, Andreas Gamp...
SDM
2007
SIAM
177views Data Mining» more  SDM 2007»
13 years 7 months ago
Multi-way Clustering on Relation Graphs
A number of real-world domains such as social networks and e-commerce involve heterogeneous data that describes relations between multiple classes of entities. Understanding the n...
Arindam Banerjee, Sugato Basu, Srujana Merugu
CRYPTO
2005
Springer
110views Cryptology» more  CRYPTO 2005»
13 years 11 months ago
The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption
Motivated by the security of the nonlinear filter generator, the concept of correlation was previously extended to the conditional correlation, that studied the linear correlation...
Yi Lu 0002, Willi Meier, Serge Vaudenay
GLOBECOM
2007
IEEE
14 years 15 days ago
Minimum Coverage Breach and Maximum Network Lifetime in Wireless Sensor Networks
—Network lifetime is a critical issue in Wireless Sensor Networks. It is possible to extend network lifetime by organizing the sensors into a number of sensor covers. However, wi...
Chen Wang, My T. Thai, Yingshu Li, Feng Wang 0002,...