Sciweavers

12257 search results - page 2172 / 2452
» Analysis of Algorithms
Sort
View
SIGCOMM
1994
ACM
15 years 7 months ago
MACAW: A Media Access Protocol for Wireless LAN's
In recent years, a wide variety of mobile computing devices has emerged, including portables, palmtops, and personal digit al assistants. Providing adequate network connectivity y...
Vaduvur Bharghavan, Alan J. Demers, Scott Shenker,...
ISBRA
2010
Springer
15 years 7 months ago
A Novel Approach for Compressing Phylogenetic Trees
Abstract. Phylogenetic trees are tree structures that depict relationships between organisms. Popular analysis techniques often produce large collections of candidate trees, which ...
Suzanne Matthews, Seung-Jin Sul, Tiffani L. Willia...
ACNS
2010
Springer
161views Cryptology» more  ACNS 2010»
15 years 7 months ago
Multi-trail Statistical Saturation Attacks
Abstract. Statistical Saturation Attacks have been introduced and applied to the block cipher PRESENT at CT-RSA 2009. In this paper, we consider their natural extensions. First, we...
Baudoin Collard, François-Xavier Standaert
136
Voted
ICPR
2010
IEEE
15 years 7 months ago
A Hypothesis Testing Approach for Fluorescent Blob Identification
Template matching is a common approach for identifying fluorescent objects within a biological image. But how to decide a threshold value for the purpose of justifying the goodness...
Le-Shin Wu, Sidney Shaw
AAAI
2007
15 years 6 months ago
Compact Spectral Bases for Value Function Approximation Using Kronecker Factorization
A new spectral approach to value function approximation has recently been proposed to automatically construct basis functions from samples. Global basis functions called proto-val...
Jeffrey Johns, Sridhar Mahadevan, Chang Wang
« Prev « First page 2172 / 2452 Last » Next »