Sciweavers

1789 search results - page 236 / 358
» New analysis and results for the Frank-Wolfe method
Sort
View
IWFM
2003
15 years 2 months ago
Using Admissible Interference to Detect Denial of Service Vulnerabilities
Meadows recently proposed a formal cost-based framework for analysis of denial of service. It was showed how some principles that have already been used to make cryptographic prot...
Stéphane Lafrance, John Mullins
137
Voted
MICCAI
2010
Springer
14 years 12 months ago
Detecting Brain Activation in fMRI Using Group Random Walker
Due to the complex noise structure of functional magnetic resonance imaging (fMRI) data, methods that rely on information within a single subject often results in unsatisfactory fu...
Bernard Ng, Ghassan Hamarneh, Rafeef Abugharbieh
ICDAR
2009
IEEE
14 years 11 months ago
Hierarchical Shape Primitive Features for Online Text-independent Writer Identification
This paper proposes a novel method to text-independent writer identification from online handwriting. The main contributions of our method include two parts: shape primitive repre...
Bangy Li, Zhenan Sun, Tieniu Tan
BMCBI
2008
121views more  BMCBI 2008»
15 years 1 months ago
GeneTrailExpress: a web-based pipeline for the statistical evaluation of microarray experiments
Background: High-throughput methods that allow for measuring the expression of thousands of genes or proteins simultaneously have opened new avenues for studying biochemical proce...
Andreas Keller, Christina Backes, Maher Al-Awadhi,...
SAS
2009
Springer
281views Formal Methods» more  SAS 2009»
16 years 2 months ago
A Verifiable, Control Flow Aware Constraint Analyzer for Bounds Check Elimination
The Java programming language requires that out-of-bounds array accesses produce runtime exceptions. In general, this requires a dynamic bounds check each time an array element is...
David Niedzielski, Jeffery von Ronne, Andreas Gamp...