Sciweavers

7200 search results - page 1396 / 1440
» On the Computational Power of Winner-Take-All
Sort
View
EUROCRYPT
1990
Springer
15 years 6 months ago
Experimental Quantum Cryptography
We describe results from an apparatus and protocol designed to implement quantum key distribution, by which two users, who share no secret information initially: 1) exchange a ran...
Charles H. Bennett, François Bessette, Gill...
POPL
1989
ACM
15 years 6 months ago
How to Make ad-hoc Polymorphism Less ad-hoc
raction that a programming language provides influences the structure and algorithmic complexity of the resulting programs: just imagine creating an artificial intelligence engine ...
Philip Wadler, Stephen Blott
ASPDAC
2007
ACM
98views Hardware» more  ASPDAC 2007»
15 years 6 months ago
Node Mergers in the Presence of Don't Cares
Abstract-- SAT sweeping is the process of merging two or more functionally equivalent nodes in a circuit by selecting one of them to represent all the other equivalent nodes. This ...
Stephen Plaza, Kai-Hui Chang, Igor L. Markov, Vale...
BIBE
2007
IEEE
129views Bioinformatics» more  BIBE 2007»
15 years 5 months ago
Statistial Analysis of nucleosome occupancy and histone modification data
Abstract-- In eukaryotic cells, genomic DNAs wrap around beadlike molecules, called nucleosomes, so as to pack more compactly in the nucleus of the cell. The nucleosome is made up ...
Guo-Cheng Yuan, Jun S. Liu
CIKM
2007
Springer
15 years 5 months ago
A segment-based hidden markov model for real-setting pinyin-to-chinese conversion
Hidden markov model (HMM) is frequently used for Pinyin-toChinese conversion. But it only captures the dependency with the preceding character. Higher order markov models can brin...
Xiaohua Zhou, Xiaohua Hu, Xiaodan Zhang, Xiajiong ...
« Prev « First page 1396 / 1440 Last » Next »