Sciweavers

2658 search results - page 395 / 532
» On efficient balanced codes
Sort
View
SAC
2010
ACM
15 years 6 months ago
Reactive parallel processing for synchronous dataflow
The control flow of common processors does not match the specific needs of reactive systems. Key issues for these systems are preemption and concurrency, combined with timing pred...
Claus Traulsen, Reinhard von Hanxleden
IADIS
2008
15 years 6 months ago
Dagma: Mining Directed Acyclic Graphs
We present how to efficiently mine a set of directed acyclic graphs (DAGs) for unconnected, both multi- or single-rooted, and induced fragments. With a new canonical form that is ...
T. Werth, A. Dreweke, Marc Wörlein, Ingrid Fi...
NIPS
2008
15 years 6 months ago
Characterizing neural dependencies with copula models
The coding of information by neural populations depends critically on the statistical dependencies between neuronal responses. However, there is no simple model that can simultane...
Pietro Berkes, Frank Wood, Jonathan Pillow
SICHERHEIT
2008
15 years 6 months ago
A Cryptographic Biometric Authentication System based on Genetic Fingerprints
We specify a system for authentication and key derivation using genetic fingerprints which prevents the recovery of biometric information from data stored for verification. We pre...
Ulrike Korte, Michael Krawczak, Johannes Merkle, R...
SEC
2007
15 years 6 months ago
A Survey of Bots Used for Distributed Denial of Service Attacks
Abstract. In recent years, we have seen the arrival of Distributed Denial-ofService (DDoS) open-source bot-based attack tools facilitating easy code enhancement, and so resulting i...
Vrizlynn L. L. Thing, Morris Sloman, Naranker Dula...