Sciweavers

5131 search results - page 947 / 1027
» Heterogeneous Component Analysis
Sort
View
90
Voted
NAR
2011
225views Computer Vision» more  NAR 2011»
14 years 1 months ago
PHOSIDA 2011: the posttranslational modification database
The primary purpose of PHOSIDA (http://www .phosida.com) is to manage posttranslational modification sites of various species ranging from bacteria to human. Since its last report...
Florian Gnad, Jeremy Gunawardena, Matthias Mann 00...
SIAMSC
2011
140views more  SIAMSC 2011»
14 years 1 months ago
A Fast Parallel Algorithm for Selected Inversion of Structured Sparse Matrices with Application to 2D Electronic Structure Calcu
Abstract. An efficient parallel algorithm is presented and tested for computing selected components of H−1 where H has the structure of a Hamiltonian matrix of two-dimensional la...
Lin Lin, Chao Yang, Jianfeng Lu, Lexing Ying, Wein...
99
Voted
AAAI
2011
13 years 11 months ago
Exploiting Phase Transition in Latent Networks for Clustering
In this paper, we model the pair-wise similarities of a set of documents as a weighted network with a single cutoff parameter. Such a network can be thought of an ensemble of unwe...
Vahed Qazvinian, Dragomir R. Radev
91
Voted
CEJCS
2011
80views more  CEJCS 2011»
13 years 11 months ago
Evaluating distributed real-time and embedded system test correctness using system execution traces
: Effective validation of distributed real-time and embedded (DRE) system quality-of-service (QoS) properties (e.g., event prioritization, latency, and throughput) requires testin...
James H. Hill, Pooja Varshneya, Douglas C. Schmidt
120
Voted
CHES
2011
Springer
254views Cryptology» more  CHES 2011»
13 years 11 months ago
Extractors against Side-Channel Attacks: Weak or Strong?
Randomness extractors are important tools in cryptography. Their goal is to compress a high-entropy source into a more uniform output. Beyond their theoretical interest, they have ...
Marcel Medwed, François-Xavier Standaert