Sciweavers

2153 search results - page 168 / 431
» From Requirements Models to Formal Specifications in B
Sort
View
76
Voted
BMCBI
2007
133views more  BMCBI 2007»
14 years 10 months ago
An efficient pseudomedian filter for tiling microrrays
Background: Tiling microarrays are becoming an essential technology in the functional genomics toolbox. They have been applied to the tasks of novel transcript identification, elu...
Thomas E. Royce, Nicholas Carriero, Mark B. Gerste...
114
Voted
ASIACRYPT
2009
Springer
15 years 4 months ago
Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices
Abstract. We describe a public-key encryption scheme based on lattices — specifically, based on the hardness of the learning with error (LWE) problem — that is secure against ...
Jonathan Katz, Vinod Vaikuntanathan
LCN
2008
IEEE
15 years 4 months ago
Modeling of two-flow interactions under SINR model in Multi-hop Wireless Networks
—Carrier Sense Multiple Access (CSMA) protocols in Multi-hop Wireless Networks (MHWN) are known to suffer from different forms of the hidden and exposed terminal problems, leadin...
Saquib Razak, Nael B. Abu-Ghazaleh, Vinay Kolar
WSC
2000
14 years 11 months ago
Using simulation to evaluate cargo ship design on the LPD17 program
As part of the design of the next generation Naval Amphibious Transport Dock Ship (LPD17), simulation was used to evaluate the arrangement and flow of cargo on the ship and to int...
Joseph Hugan
100
Voted
ICIP
2008
IEEE
15 years 12 months ago
Learning action dictionaries from video
Summarizing the contents of a video containing human activities is an important problem in computer vision and has important applications in automated surveillance systems. Summar...
Pavan K. Turaga, Rama Chellappa