Sciweavers

2292 search results - page 267 / 459
» Structure preserving embedding
Sort
View
CODES
2005
IEEE
15 years 10 months ago
Enhancing security through hardware-assisted run-time validation of program data properties
The growing number of information security breaches in electronic and computing systems calls for new design paradigms that consider security as a primary design objective. This i...
Divya Arora, Anand Raghunathan, Srivaths Ravi, Nir...
130
Voted
BMCBI
2008
112views more  BMCBI 2008»
15 years 5 months ago
A general modeling and visualization tool for comparing different members of a group: application to studying tau-mediated regul
Background: Innumerable biological investigations require comparing collections of molecules, cells or organisms to one another with respect to one or more of their properties. Al...
Arnab Bhattacharya, Sasha Levy, Adria LeBoeuf, Mic...
SIAMDM
2010
194views more  SIAMDM 2010»
14 years 11 months ago
Combinatorics and Geometry of Finite and Infinite Squaregraphs
Abstract. Squaregraphs were originally defined as finite plane graphs in which all inner faces are quadrilaterals (i.e., 4-cycles) and all inner vertices (i.e., the vertices not in...
Hans-Jürgen Bandelt, Victor Chepoi, David Epp...
ESOP
2000
Springer
15 years 8 months ago
Compile-Time Debugging of C Programs Working on Trees
We exhibit a technique for automatically verifying the safety of simple C programs working on tree-shaped data structures. We do not consider the complete behavior of programs, but...
Jacob Elgaard, Anders Møller, Michael I. Sc...
142
Voted
MM
2005
ACM
122views Multimedia» more  MM 2005»
15 years 10 months ago
Image clustering with tensor representation
We consider the problem of image representation and clustering. Traditionally, an n1 × n2 image is represented by a vector in the Euclidean space Rn1×n2 . Some learning algorith...
Xiaofei He, Deng Cai, Haifeng Liu, Jiawei Han