Sciweavers

722 search results - page 26 / 73
» Efficient Generation of Prime Numbers
Sort
View
89 views 147 votes 15 years 4 months ago  BMCBI 2008»
Background: Simulating the major molecular events inside an Escherichia coli cell can lead to a very large number of reactions that compose its overall behaviour. Not only should ...
123 views 132 votes 15 years 7 months ago  ECML 2006»
Recently, stability-based techniques have emerged as a very promising solution to the problem of cluster validation. An inherent drawback of these approaches is the computational c...
143 views 142 votes 14 years 11 months ago  IJNSEC 2010»
Digital Signature Algorithm (DSA) is an underlying algorithm to form a signature in the Digital Signature Standard (DSS). DSA uses a new random number (or nonce) each time a signa...
172 views 144 votes 15 years 8 months ago  GLVLSI 2009»
A methodology is proposed to efficiently estimate the substrate noise generated by large scale aggressor circuits. Small spatial voltage differences within the ground distribution...
205 views 137 votes 15 years 6 months ago  CVPR 2010»
Image similarity search is a fundamental problem in computer vision. Efficient similarity search across large image databases depends critically on the availability of compact ima...
116 views 136 votes 15 years 8 months ago  EGH 2004»
Partitioning fragment shaders into multiple rendering passes is an effective technique for virtualizing shading resource limits in graphics hardware. The Recursive Dominator Split...
121 views 140 votes 15 years 5 months ago  DICTA 2007»
Apply is a Domain-Specific Language for image processing and low-level computer vision. Apply allows programmers to write kernel operations that focus on the computation for a sin...
150 views 152 votes 14 years 11 months ago  TCSV 2010»
Hierarchical structure is a useful tool for providing the necessary scalability in adapting to the variety of channel environments. For schemes involving hierarchical picture struc...
123 views 138 votes 15 years 6 months ago  DSN 2008»
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
220 views 146 votes 15 years 7 months ago  DCOSS 2010»
Traditional deployments of wireless sensor networks (WSNs) rely on static basestations to collect data. For applications with highly spatio-temporal and dynamic data generation, su...