Sciweavers

68 search results - page 13 / 14
» The Impact of Noise on the Scaling of Collectives: A Theoret...
Sort
View
BMCBI
2010
172views more  BMCBI 2010»
13 years 6 months ago
Comparison of evolutionary algorithms in gene regulatory network model inference
Background: The evolution of high throughput technologies that measure gene expression levels has created a data base for inferring GRNs (a process also known as reverse engineeri...
Alina Sîrbu, Heather J. Ruskin, Martin Crane
JSAC
2008
146views more  JSAC 2008»
13 years 6 months ago
On the Interaction and Competition among Internet Service Providers
The current Internet architecture comprises of different privately owned Internet service providers (ISPs) where higher tier ISPs supply connectivity service to lower tier ISPs an...
Sam C. M. Lee, John C. S. Lui
SP
2007
IEEE
108views Security Privacy» more  SP 2007»
14 years 19 days ago
Trojan Detection using IC Fingerprinting
Hardware manufacturers are increasingly outsourcing their IC fabrication work overseas due to much lower costs. This poses a significant security risk for ICs used for critical m...
Dakshi Agrawal, Selçuk Baktir, Deniz Karako...
JSA
2010
173views more  JSA 2010»
13 years 1 months ago
Hardware/software support for adaptive work-stealing in on-chip multiprocessor
During the past few years, embedded digital systems have been requested to provide a huge amount of processing power and functionality. A very likely foreseeable step to pursue th...
Quentin L. Meunier, Frédéric P&eacut...
TSMC
2010
13 years 1 months ago
Geometric Distortion Insensitive Image Watermarking in Affine Covariant Regions
Feature-based image watermarking schemes, which aim to survive various geometric distortions, have attracted great attention in recent years. Existing schemes have shown robustness...
Xinbo Gao, Cheng Deng, Xuelong Li, Dacheng Tao