Sciweavers

1188 search results - page 79 / 238
» Generating Connectives
Sort
View
117
Voted
KDID
2004
149views Database» more  KDID 2004»
15 years 4 months ago
Database Transposition for Constrained (Closed) Pattern Mining
Abstract. Recently, different works proposed a new way to mine patterns in databases with pathological size. For example, experiments in genome biology usually provide databases wi...
Baptiste Jeudy, François Rioult
3DOR
2009
15 years 4 months ago
SHREC'09 Track: Structural Shape Retrieval on Watertight Models
The annual SHape REtrieval Contest (SHREC) measures the performance of 3D model retrieval methods for several different types of models and retrieval purposes. In this contest the...
J. Hartveldt, Michela Spagnuolo, Apostolos Axenopo...
CHES
2010
Springer
172views Cryptology» more  CHES 2010»
15 years 4 months ago
Analysis and Improvement of the Random Delay Countermeasure of CHES 2009
Random delays are often inserted in embedded software to protect against side-channel and fault attacks. At CHES 2009 a new method for generation of random delays was described tha...
Jean-Sébastien Coron, Ilya Kizhvatov
105
Voted
CORR
2010
Springer
121views Education» more  CORR 2010»
15 years 3 months ago
Simulation vs. Equivalence
For several semirings S, two weighted finite automata with multiplicities in S are equivalent if and only if they can be connected by a chain of simulations. Such a semiring S is c...
Zoltán Ésik, Andreas Maletti
116
Voted
JNW
2006
98views more  JNW 2006»
15 years 3 months ago
Efficient Distributed Algorithm for RWA Using Path Protection
A number of Integer Linear Program (ILP) formulations for both static and dynamic lightpath allocation have been proposed, for the design of survivable WDM networks. However, such ...
Arunita Jaekel, Ying Chen