Sciweavers

1756 search results - page 152 / 352
» Current Directions in Hyper-Programming
Sort
View
CCS
2010
ACM
15 years 20 days ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...
CVPR
2011
IEEE
14 years 11 months ago
Unbiased Look at Dataset Bias
Datasets are an integral part of contemporary object recognition research. They have been the chief reason for the considerable progress in the field, not just as source of large...
Antonio Torralba, Alyosha Efros
135
Voted
BMCBI
2010
137views more  BMCBI 2010»
14 years 11 months ago
The ancient history of the structure of ribonuclease P and the early origins of Archaea
Background: Ribonuclease P is an ancient endonuclease that cleaves precursor tRNA and generally consists of a catalytic RNA subunit (RPR) and one or more proteins (RPPs). It repre...
Feng-Jie Sun, Gustavo Caetano-Anollés
BMCBI
2011
14 years 11 months ago
R2R - software to speed the depiction of aesthetic consensus RNA secondary structures
Background: With continuing identification of novel structured noncoding RNAs, there is an increasing need to create schematic diagrams showing the consensus features of these mol...
Zasha Weinberg, Ronald R. Breaker
CDC
2010
IEEE
160views Control Systems» more  CDC 2010»
14 years 11 months ago
Model-on-Demand predictive control for nonlinear hybrid systems with application to adaptive behavioral interventions
This paper presents a data-centric modeling and predictive control approach for nonlinear hybrid systems. System identification of hybrid systems represents a challenging problem b...
Naresh N. Nandola, Daniel E. Rivera