Sciweavers

707 search results - page 113 / 142
» Performance Modeling and Analysis of the Universal Control H...
Sort
View
89
Voted
BMCBI
2010
113views more  BMCBI 2010»
14 years 12 months ago
Gene prioritization and clustering by multi-view text mining
Background: Text mining has become a useful tool for biologists trying to understand the genetics of diseases. In particular, it can help identify the most interesting candidate g...
Shi Yu, Léon-Charles Tranchevent, Bart De M...
SI3D
2010
ACM
15 years 6 months ago
Synthesis and editing of personalized stylistic human motion
This paper presents a generative human motion model for synthesis, retargeting, and editing of personalized human motion styles. We first record a human motion database from mult...
Jianyuan Min, Huajun Liu, Jinxiang Chai
ACNS
2009
Springer
150views Cryptology» more  ACNS 2009»
15 years 3 months ago
How to Compare Profiled Side-Channel Attacks?
Side-channel attacks are an important class of attacks against cryptographic devices and profiled side-channel attacks are the most powerful type of side-channel attacks. In this s...
François-Xavier Standaert, François ...
CCS
2006
ACM
15 years 3 months ago
Secure hierarchical in-network aggregation in sensor networks
In-network aggregation is an essential primitive for performing queries on sensor network data. However, most aggregation algorithms assume that all intermediate nodes are trusted...
Haowen Chan, Adrian Perrig, Dawn Xiaodong Song
COMCOM
2008
100views more  COMCOM 2008»
14 years 12 months ago
The impact of code allocation on the multiple access interference in WCDMA systems
Code allocation has a significant impact on the performance of Code Division Multiple Access (CDMA) systems. For the uplink direction, in 3G Wideband CDMA (WCDMA) cellular systems...
Thamer Al-Meshhadany, Wessam Ajib