Sciweavers

1518 search results - page 237 / 304
» Cryptographic Test Correction
Sort
View
100
Voted
BMCBI
2007
123views more  BMCBI 2007»
15 years 19 days ago
GO for gene documents
Annotating genes and their products with Gene Ontology codes is an important area of research. One approach for doing this is to use the information available about these genes in...
Padmini Srinivasan, Xin Ying Qiu
CAD
2007
Springer
15 years 19 days ago
Boundary of the volume swept by a free-form solid in screw motion
The swept volume of a moving solid is a powerful computational and visualization concept. It provides an excellent aid for path and accessibility planning in robotics and for simu...
Jarek Rossignac, J. J. Kim, S. C. Song, K. C. Suh,...
INFORMATICALT
2008
196views more  INFORMATICALT 2008»
15 years 18 days ago
An Efficient and Sensitive Decision Tree Approach to Mining Concept-Drifting Data Streams
Abstract. Data stream mining has become a novel research topic of growing interest in knowledge discovery. Most proposed algorithms for data stream mining assume that each data blo...
Cheng-Jung Tsai, Chien-I Lee, Wei-Pang Yang
100
Voted
INFORMATICALT
2008
115views more  INFORMATICALT 2008»
15 years 18 days ago
A Fine-Grained Access Control System Combining MAC and RBACK Models for XML
In this paper, we present a novel fine-grained access control system for applications where the information flow is critical; the confidentiality of the data is essential and there...
Mustafa M. Kocatürk, Taflan I. Gündem
IJES
2006
99views more  IJES 2006»
15 years 18 days ago
Dynamic reconfiguration for management of radiation-induced faults in FPGAs
This paper describes novel methods of exploiting the partial, dynamic reconfiguration capabilities of Xilinx Virtex V1000 FPGAs to manage single-event upset (SEU) faults due to rad...
Maya Gokhale, Paul Graham, Michael J. Wirthlin, Da...