Sciweavers

2147 search results - page 375 / 430
» Natural Phenomena Simulation
Sort
View
ENTCS
2007
153views more  ENTCS 2007»
14 years 10 months ago
The Methods of Approximation and Lifting in Real Computation
The basic motivation behind this work is to tie together various computational complexity classes, whether over different domains such as the naturals or the reals, or whether de...
Manuel Lameiras Campagnolo, Kerry Ojakian
PAMI
2006
229views more  PAMI 2006»
14 years 10 months ago
A Coherent Computational Approach to Model Bottom-Up Visual Attention
Visual attention is a mechanism which filters out redundant visual information and detects the most relevant parts of our visual field. Automatic determination of the most visually...
Olivier Le Meur, Patrick Le Callet, Dominique Barb...
JPDC
2007
112views more  JPDC 2007»
14 years 10 months ago
CHEMAS: Identify suspect nodes in selective forwarding attacks
Selective forwarding attacks may corrupt some mission-critical applications such as military surveillance and forest fire monitoring in wireless sensor networks. In such attacks,...
Bin Xiao, Bo Yu, Chuanshan Gao
BMCBI
2004
100views more  BMCBI 2004»
14 years 10 months ago
Handling multiple testing while interpreting microarrays with the Gene Ontology Database
Background: The development of software tools that analyze microarray data in the context of genetic knowledgebases is being pursued by multiple research groups using different me...
Michael V. Osier, Hongyu Zhao, Kei-Hoi Cheung
SIAMCOMP
2000
118views more  SIAMCOMP 2000»
14 years 10 months ago
Constructive, Deterministic Implementation of Shared Memory on Meshes
This paper describes a scheme to implement a shared address space of size m on an n-node mesh, with m polynomial in n, where each mesh node hosts a processor and a memory module. A...
Andrea Pietracaprina, Geppino Pucci, Jop F. Sibeyn