Sciweavers

75 search results - page 12 / 15
» Independent component analysis by entropy bound minimization
Sort
View
110
Voted
PDCAT
2005
Springer
15 years 7 months ago
A New Algorithm to Solve Synchronous Consensus for Dependent Failures
Fault tolerant algorithms are often designed under the t-out-of-n assumption, which is based on the assumption that all processes or components fail independently with equal proba...
Jun Wang, Min Song
PRESENCE
2002
88views more  PRESENCE 2002»
15 years 1 months ago
Measurement, Analysis and Display of Haptic Signals During Surgical Cutting
The forces experienced while surgically cutting anatomical tissues from a sheep and two rats were investigated for three scissor types. Data were collected in situ using instrumen...
Stephanie Greenish, Vincent Hayward, Vanessa B. Ch...
ACISP
2008
Springer
15 years 8 months ago
Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers
The elastic block cipher design employs the round function of a given, b-bit block cipher in a black box fashion, embedding it in a network structure to construct a family of ciphe...
Debra L. Cook, Moti Yung, Angelos D. Keromytis
ECCV
2004
Springer
16 years 3 months ago
A Linguistic Feature Vector for the Visual Interpretation of Sign Language
Abstract. This paper presents a novel approach to sign language recognition that provides extremely high classification rates on minimal training data. Key to this approach is a 2 ...
Richard Bowden, David Windridge, Timor Kadir, Andr...
IWMM
2010
Springer
140views Hardware» more  IWMM 2010»
15 years 3 months ago
Parametric inference of memory requirements for garbage collected languages
The accurate prediction of program's memory requirements is a critical component in software development. Existing heap space analyses either do not take deallocation into ac...
Elvira Albert, Samir Genaim, Miguel Gómez-Z...