Sciweavers

2499 search results - page 126 / 500
» The Serializability of Network Codes
Sort
View
ICANN
2003
Springer
15 years 3 months ago
Optimizing Property Codes in Protein Data Reveals Structural Characteristics
We search for assignments of numbers to the amino acids (property codes) that maximize the autocorrelation function signal in given protein sequence data by an iterative method. Ou...
Olaf Weiss, Andreas Ziehe, Hanspeter Herzel
ESANN
2006
14 years 11 months ago
Recognition of handwritten digits using sparse codes generated by local feature extraction methods
We investigate when sparse coding of sensory inputs can improve performance in a classification task. For this purpose, we use a standard data set, the MNIST database of handwritte...
Rebecca Steinert, Martin Rehn, Anders Lansner
DSN
2005
IEEE
15 years 3 months ago
Coverage and the Use of Cyclic Redundancy Codes in Ultra-Dependable Systems
A Cyclic Redundancy Code (CRC), when used properly, can be an effective and relatively inexpensive method to detect data corruption across communication channels. However, some sy...
Michael Paulitsch, Jennifer Morris, Brendan Hall, ...
STOC
1994
ACM
134views Algorithms» more  STOC 1994»
15 years 2 months ago
A coding theorem for distributed computation
Shannon's Coding Theorem shows that in order to reliably transmit a message of T bits over a noisy communication channel, only a constant slowdown factor is necessary in the ...
Sridhar Rajagopalan, Leonard J. Schulman
ICC
2007
IEEE
15 years 4 months ago
Using Session-Keystroke Mutual Information to Detect Self-Propagating Malicious Codes
— In this paper, we propose an endpoint-based joint network-host anomaly detection technique to detect selfpropagating malicious codes. Our proposed technique is based on the obs...
Syed A. Khayam, Hayder Radha