Sciweavers

6289 search results - page 69 / 1258
» Error Sequence Analysis
Sort
View
IJNSEC
2011
145views more  IJNSEC 2011»
14 years 11 months ago
Symmetric Key Image Encryption Scheme with Key Sequences Derived from Random Sequence of Cyclic Elliptic Curve Points
In this paper, cyclic elliptic curves of the form y2 + xy = x3 + ax2 + b, a, b ∈ GF(2m ) with order M is considered in the design of a Symmetric Key Image Encryption Scheme with...
S. V. Sathyanarayana, M. Aswatha Kumar, K. N. Hari...
ICDM
2009
IEEE
223views Data Mining» more  ICDM 2009»
15 years 10 months ago
Execution Anomaly Detection in Distributed Systems through Unstructured Log Analysis
Abstract -- Detection of execution anomalies is very important for the maintenance, development, and performance refinement of large scale distributed systems. Execution anomalies ...
Qiang Fu, Jian-Guang Lou, Yi Wang, Jiang Li
BMCBI
2008
135views more  BMCBI 2008»
15 years 4 months ago
Using Generalized Procrustes Analysis (GPA) for normalization of cDNA microarray data
Background: Normalization is essential in dual-labelled microarray data analysis to remove nonbiological variations and systematic biases. Many normalization methods have been use...
Huiling Xiong, Dapeng Zhang, Christopher J. Martyn...
CCGRID
2006
IEEE
15 years 10 months ago
Component-Based Modeling, Analysis and Animation
Component-based software construction is widely used in a variety of applications, from embedded environments to grid computing. However, errors in these applications and systems ...
Jeff Kramer
DM
2011
238views Education» more  DM 2011»
14 years 11 months ago
A combinatorial approach to height sequences in finite partially ordered sets
Fix an element x of a finite partially ordered set P on n elements. Then let hi(x) be the number of linear extensions of P in which x is in position i, counting from the bottom. T...
Csaba Biró, William T. Trotter