Sciweavers

8600 search results - page 1675 / 1720
» Measuring with Timed Patterns
Sort
View
AUIC
2004
IEEE
15 years 1 months ago
Rapid Visual Flow: How Fast Is Too Fast?
It is becoming increasingly common for user interfaces to use zooming visual effects that automatically adapt to user actions. The MacOs X `dock' icon panel, for instance, us...
Andrew Wallace, Joshua Savage, Andy Cockburn
CODES
2004
IEEE
15 years 1 months ago
Operation tables for scheduling in the presence of incomplete bypassing
Register bypassing is a powerful and widely used feature in modern processors to eliminate certain data hazards. Although complete bypassing is ideal for performance, bypassing ha...
Aviral Shrivastava, Eugene Earlie, Nikil D. Dutt, ...
CSB
2004
IEEE
135views Bioinformatics» more  CSB 2004»
15 years 1 months ago
Selection of Patient Samples and Genes for Outcome Prediction
Gene expression profiles with clinical outcome data enable monitoring of disease progression and prediction of patient survival at the molecular level. We present a new computatio...
Huiqing Liu, Jinyan Li, Limsoon Wong
CIKM
2006
Springer
15 years 1 months ago
Eigen-trend: trend analysis in the blogosphere based on singular value decompositions
The blogosphere--the totality of blog-related Web sites-has become a great source of trend analysis in areas such as product survey, customer relationship, and marketing. Existing...
Yun Chi, Belle L. Tseng, Jun'ichi Tatemura
CIT
2006
Springer
15 years 1 months ago
A new collision resistant hash function based on optimum dimensionality reduction using Walsh-Hadamard transform
Hash functions play the most important role in various cryptologic applications, ranging from data integrity checking to digital signatures. Our goal is to introduce a new hash fu...
Barzan Mozafari, Mohammad Hasan Savoji
« Prev « First page 1675 / 1720 Last » Next »