Sciweavers

3143 search results - page 171 / 629
» Minimization of entropy functionals
Sort
View
BMCBI
2007
114views more  BMCBI 2007»
15 years 4 months ago
False occurrences of functional motifs in protein sequences highlight evolutionary constraints
Background: False occurrences of functional motifs in protein sequences can be considered as random events due solely to the sequence composition of a proteome. Here we use a nume...
Allegra Via, Pier Federico Gherardini, Enrico Ferr...
SODA
2008
ACM
104views Algorithms» more  SODA 2008»
15 years 5 months ago
Ranged hash functions and the price of churn
Ranged hash functions generalize hash tables to the setting where hash buckets may come and go over time, a typical case in distributed settings where hash buckets may correspond ...
James Aspnes, Muli Safra, Yitong Yin
133
Voted
SAC
2009
ACM
15 years 8 months ago
Impact of function inlining on resource-constrained embedded systems
With the development of computer systems, function inlining schemes were used to reduce execution time while increasing codes. In embedded systems such as wireless sensor nodes, t...
Bongjae Kim, Sangho Yi, Yookun Cho, Jiman Hong
ASIACRYPT
2009
Springer
15 years 10 months ago
A Modular Design for Hash Functions: Towards Making the Mix-Compress-Mix Approach Practical
The design of cryptographic hash functions is a very complex and failure-prone process. For this reason, this paper puts forward a completely modular and fault-tolerant approach to...
Anja Lehmann, Stefano Tessaro
124
Voted
CDC
2009
IEEE
134views Control Systems» more  CDC 2009»
15 years 8 months ago
Event-based control using quadratic approximate value functions
Abstract— In this paper we consider several problems involving control with limited actuation and sampling rates. Event-based control has emerged as an attractive approach for ad...
Randy Cogill