Sciweavers

1191 search results - page 165 / 239
» Compute the Term Contributed Frequency
Sort
View
ESORICS
2004
Springer
15 years 3 months ago
Parameterized Authentication
We describe an approach to sensor-based authentication that can adapt to accommodate incomplete, unreliable, or inaccurate input provided to the system. Parameterized Authenticatio...
Michael J. Covington, Mustaque Ahamad, Irfan A. Es...
IMC
2003
ACM
15 years 3 months ago
An analysis of Internet chat systems
In our quest to better understand network traffic dynamics, we examine Internet chat systems. Although chat as an application does not contribute huge amounts of traffic, chat sys...
Christian Dewes, Arne Wichmann, Anja Feldmann
ISSS
2002
IEEE
124views Hardware» more  ISSS 2002»
15 years 2 months ago
Timing Analysis of Embedded Software for Speculative Processors
Static timing analysis of embedded software is important for systems with hard real-time constraints. To accurately estimate time bounds, it is essential to model the underlying m...
Abhik Roychoudhury, Xianfeng Li, Tulika Mitra
MCS
2010
Springer
15 years 2 months ago
An Experimental Comparison of Hierarchical Bayes and True Path Rule Ensembles for Protein Function Prediction
Abstract. The computational genome-wide annotation of gene functions requires the prediction of hierarchically structured functional classes and can be formalized as a multiclass, ...
Matteo Re, Giorgio Valentini
COMPGEOM
2009
ACM
15 years 2 months ago
k-means requires exponentially many iterations even in the plane
The k-means algorithm is a well-known method for partitioning n points that lie in the d-dimensional space into k clusters. Its main features are simplicity and speed in practice....
Andrea Vattani