Sciweavers

2797 search results - page 484 / 560
» Code query by example
Sort
View
CSREASAM
2003
15 years 4 months ago
Randomized Traitor Tracing Algorithms for Broadcast Security
We introduce and analyze a randomized traitor tracing algorithm for broadcast security. This algorithm is very efficient compared to brute force methods (the mean time it takes is...
Simon McNicol, Serdar Boztas
NIPS
2004
15 years 4 months ago
Maximising Sensitivity in a Spiking Network
We use unsupervised probabilistic machine learning ideas to try to explain the kinds of learning observed in real neurons, the goal being to connect abstract principles of self-or...
Anthony J. Bell, Lucas C. Parra
CCGRID
2010
IEEE
15 years 3 months ago
FaReS: Fair Resource Scheduling for VMM-Bypass InfiniBand Devices
In order to address the high performance I/O needs of HPC and enterprise applications, modern interconnection fabrics, such as InfiniBand and more recently, 10GigE, rely on network...
Adit Ranadive, Ada Gavrilovska, Karsten Schwan
BMCBI
2008
90views more  BMCBI 2008»
15 years 3 months ago
Genome-scale study of the importance of binding site context for transcription factor binding and gene regulation
Background: The rate of mRNA transcription is controlled by transcription factors that bind to specific DNA motifs in promoter regions upstream of protein coding genes. Recent res...
Jakub Orzechowski Westholm, Feifei Xu, Hans Ronne,...
CORR
2008
Springer
158views Education» more  CORR 2008»
15 years 3 months ago
Declarative Combinatorics: Isomorphisms, Hylomorphisms and Hereditarily Finite Data Types in Haskell
This paper is an exploration in a functional programming framework of isomorphisms between elementary data types (natural numbers, sets, finite functions, permutations binary deci...
Paul Tarau