Sciweavers

75 search results - page 12 / 15
» Independent component analysis by entropy bound minimization
Sort
View
PDCAT
2005
Springer
15 years 3 months ago
A New Algorithm to Solve Synchronous Consensus for Dependent Failures
Fault tolerant algorithms are often designed under the t-out-of-n assumption, which is based on the assumption that all processes or components fail independently with equal proba...
Jun Wang, Min Song
85
Voted
PRESENCE
2002
88views more  PRESENCE 2002»
14 years 9 months ago
Measurement, Analysis and Display of Haptic Signals During Surgical Cutting
The forces experienced while surgically cutting anatomical tissues from a sheep and two rats were investigated for three scissor types. Data were collected in situ using instrumen...
Stephanie Greenish, Vincent Hayward, Vanessa B. Ch...
ACISP
2008
Springer
15 years 3 months ago
Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers
The elastic block cipher design employs the round function of a given, b-bit block cipher in a black box fashion, embedding it in a network structure to construct a family of ciphe...
Debra L. Cook, Moti Yung, Angelos D. Keromytis
ECCV
2004
Springer
15 years 11 months ago
A Linguistic Feature Vector for the Visual Interpretation of Sign Language
Abstract. This paper presents a novel approach to sign language recognition that provides extremely high classification rates on minimal training data. Key to this approach is a 2 ...
Richard Bowden, David Windridge, Timor Kadir, Andr...
IWMM
2010
Springer
140views Hardware» more  IWMM 2010»
14 years 11 months ago
Parametric inference of memory requirements for garbage collected languages
The accurate prediction of program's memory requirements is a critical component in software development. Existing heap space analyses either do not take deallocation into ac...
Elvira Albert, Samir Genaim, Miguel Gómez-Z...