Sciweavers

426 search results - page 85 / 86
» Run lengths and liquidity
Sort
View
TSP
2010
13 years 27 days ago
Steady-state MSE performance analysis of mixture approaches to adaptive filtering
In this paper, we consider mixture approaches that adaptively combine outputs of several parallel running adaptive algorithms. These parallel units can be considered as diversity b...
Suleyman Serdar Kozat, Alper T. Erdogan, Andrew C....
CORR
2011
Springer
161views Education» more  CORR 2011»
12 years 10 months ago
Quadratic Goldreich-Levin Theorems
Decomposition theorems in classical Fourier analysis enable us to express a bounded function in terms of few linear phases with large Fourier coefficients plus a part that is pseu...
Madhur Tulsiani, Julia Wolf
BMCBI
2011
12 years 9 months ago
LAVA: An Open-Source Approach To Designing LAMP (Loop-Mediated Isothermal Amplification) DNA Signatures
Background: We developed an extendable open-source Loop-mediated isothermal AMPlification (LAMP) signature design program called LAVA (LAMP Assay Versatile Analysis). LAVA was cre...
Clinton Torres, Elizabeth A. Vitalis, Brian R. Bak...
CMIG
2011
168views more  CMIG 2011»
12 years 9 months ago
Comparing axial CT slices in quantized N-dimensional SURF descriptor space to estimate the visible body region
In this paper, a method is described to automatically estimate the visible body region of a computed tomography (CT) volume image. In order to quantify the body region, a body coo...
Johannes Feulner, Shaohua Kevin Zhou, Elli Angelop...
ASIACRYPT
2011
Springer
12 years 6 months ago
The Leakage-Resilience Limit of a Computational Problem Is Equal to Its Unpredictability Entropy
A cryptographic assumption is the (unproven) mathematical statement that a certain computational problem (e.g. factoring integers) is computationally hard. The leakage-resilience l...
Divesh Aggarwal, Ueli Maurer