Sciweavers

1653 search results - page 234 / 331
» Directed tree-width examples
Sort
View
TMC
2010
161views more  TMC 2010»
15 years 3 months ago
High-Rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements
—Secret keys can be generated and shared between two wireless nodes by measuring and encoding radio channel characteristics without ever revealing the secret key to an eavesdropp...
Neal Patwari, Jessica Croft, Suman Jana, Sneha Kum...
DAC
2010
ACM
15 years 2 months ago
A robust periodic arnoldi shooting algorithm for efficient analysis of large-scale RF/MM ICs
The verification of large radio-frequency/millimeter-wave (RF/MM) integrated circuits (ICs) has regained attention for high-performance designs beyond 90nm and 60GHz. The traditio...
Xuexin Liu, Hao Yu, Sheldon X.-D. Tan
HAIS
2010
Springer
15 years 2 months ago
Reducing Dimensionality in Multiple Instance Learning with a Filter Method
In this article, we describe a feature selection algorithm which can automatically find relevant features for multiple instance learning. Multiple instance learning is considered a...
Amelia Zafra, Mykola Pechenizkiy, Sebastián...
ICCAD
2010
IEEE
186views Hardware» more  ICCAD 2010»
15 years 2 months ago
Efficient state space exploration: Interleaving stateless and state-based model checking
State-based model checking methods comprise computing and storing reachable states, while stateless model checking methods directly reason about reachable paths using decision proc...
Malay K. Ganai, Chao Wang, Weihong Li
ICDM
2010
IEEE
208views Data Mining» more  ICDM 2010»
15 years 2 months ago
Bonsai: Growing Interesting Small Trees
Graphs are increasingly used to model a variety of loosely structured data such as biological or social networks and entityrelationships. Given this profusion of large-scale graph ...
Stephan Seufert, Srikanta J. Bedathur, Juliá...