Sciweavers

6715 search results - page 1291 / 1343
» Learning from a Test Set
Sort
View
112
Voted
SIAMJO
2010
136views more  SIAMJO 2010»
14 years 10 months ago
A New Exchange Method for Convex Semi-Infinite Programming
In this paper we propose a new exchange method for solving convex semi-infinite programming (CSIP) problems. We introduce a new dropping-rule in the proposed exchange algorithm, wh...
Liping Zhang, Soon-Yi Wu, Marco A. López
BIOINFORMATICS
2011
14 years 10 months ago
All-atom knowledge-based potential for RNA structure prediction and assessment
Motivation: Over the recent years, the vision that RNA simply serves as information transfer molecule has dramatically changed. The study of the sequence/structure/function relati...
Emidio Capriotti, Tomás Norambuena, Marc A....
133
Voted
IACR
2011
86views more  IACR 2011»
14 years 3 months ago
Protecting Drive Encryption Systems Against Memory Attacks
Software drive encryption systems are vulnerable to memory attacks, in which an attacker gains physical accesses to the unattended computer, obtains the decryption keys from memor...
Leo Dorrendorf
133
Voted
CVPR
2008
IEEE
16 years 5 months ago
Unsupervised discovery of visual object class hierarchies
Objects in the world can be arranged into a hierarchy based on their semantic meaning (e.g. organism ? animal ? feline ? cat). What about defining a hierarchy based on the visual ...
Josef Sivic, Bryan C. Russell, Andrew Zisserman, W...
DAC
2008
ACM
16 years 4 months ago
Parallel programming: can we PLEASE get it right this time?
The computer industry has a problem. As Moore's law marches on, we will be exploiting it to double cores, not frequencies. But all those cores ... 2 to 4 today growing to 8, ...
Tim Mattson, Michael Wrinn
« Prev « First page 1291 / 1343 Last » Next »