Sciweavers

683 search results - page 65 / 137
» A Fine-grained Analysis of a Simple Independent Set Algorith...
Sort
View
144
Voted
STOC
2005
ACM
110views Algorithms» more  STOC 2005»
16 years 4 months ago
Key agreement from weak bit agreement
Assume that Alice and Bob, given an authentic channel, have a protocol where they end up with a bit SA and SB, respectively, such that with probability 1+ 2 these bits are equal. ...
Thomas Holenstein
108
Voted
EMSOFT
2006
Springer
15 years 7 months ago
Incremental schedulability analysis of hierarchical real-time components
Embedded systems are complex as a whole but consist of smaller independent modules minimally interacting with each other. This structure makes embedded systems amenable to composi...
Arvind Easwaran, Insik Shin, Oleg Sokolsky, Insup ...
AMC
2005
128views more  AMC 2005»
15 years 3 months ago
A new face recognition method based on SVD perturbation for single example image per person
At present, there are many methods for frontal view face recognition. However, few of them can work well when only one example image per class is available. In this paper, we pres...
Daoqiang Zhang, Songcan Chen, Zhi-Hua Zhou
147
Voted
BMCBI
2008
110views more  BMCBI 2008»
15 years 3 months ago
Methylation Linear Discriminant Analysis (MLDA) for identifying differentially methylated CpG islands
Background: Hypermethylation of promoter CpG islands is strongly correlated to transcriptional gene silencing and epigenetic maintenance of the silenced state. As well as its role...
Wei Dai, Jens M. Teodoridis, Janet Graham, Constan...
ESTIMEDIA
2006
Springer
15 years 7 months ago
Use of a Bit-true Data Flow Analysis for Processor-Specific Source Code Optimization
Nowadays, key characteristics of a processor's instruction set are only exploited in high-level languages by using inline assembly or compiler intrinsics. Inserting intrinsic...
Heiko Falk, Jens Wagner, André Schaefer