Sciweavers

7986 search results - page 1581 / 1598
» Computational Science and its Applications
Sort
View
CCS
2010
ACM
14 years 10 months ago
Securing wireless sensor networks against large-scale node capture attacks
Securing wireless sensor networks against node capture is a challenging task. All well-known random key pre-distribution systems, including the Eschenauer and Gligor's pionee...
Tuan Manh Vu, Reihaneh Safavi-Naini, Carey William...

Publication
323views
14 years 10 months ago
Reconstruction of snow and ice surfaces using multiple view  vision techniques
In this paper we describe a vision system for reconstructing the relative structure of snow and ice surfaces. This effort is one step toward the long-term goal of rendering absol...
GOWRI SOMANATH , ROHITH MV , CATHLEEN A. GEIGER ...
WOSP
2010
ACM
14 years 10 months ago
Automatically improve software architecture models for performance, reliability, and cost using evolutionary algorithms
Quantitative prediction of quality properties (i.e. extrafunctional properties such as performance, reliability, and cost) of software architectures during design supports a syste...
Anne Martens, Heiko Koziolek, Steffen Becker, Ralf...
BMCBI
2010
144views more  BMCBI 2010»
14 years 9 months ago
Super-sparse principal component analyses for high-throughput genomic data
Background: Principal component analysis (PCA) has gained popularity as a method for the analysis of highdimensional genomic data. However, it is often difficult to interpret the ...
Donghwan Lee, Woojoo Lee, Youngjo Lee, Yudi Pawita...
BMCBI
2010
117views more  BMCBI 2010»
14 years 9 months ago
New decoding algorithms for Hidden Markov Models using distance measures on labellings
Background: Existing hidden Markov model decoding algorithms do not focus on approximately identifying the sequence feature boundaries. Results: We give a set of algorithms to com...
Daniel G. Brown 0001, Jakub Truszkowski
« Prev « First page 1581 / 1598 Last » Next »