Sciweavers

3096 search results - page 111 / 620
» Theory and Use of the EM Algorithm
Sort
View
ISSAC
2005
Springer
107views Mathematics» more  ISSAC 2005»
15 years 10 months ago
Symmetric and semisymmetric graphs construction using G-graphs
Symmetric and semisymmetric graphs are used in many scientific domains, especially parallel computation and interconnection networks. The industry and the research world make a h...
Alain Bretto, Luc Gillibert, Bernard Laget
DAC
2006
ACM
16 years 5 months ago
Predicate learning and selective theory deduction for a difference logic solver
Design and verification of systems at the Register-Transfer (RT) or behavioral level require the ability to reason at higher levels of abstraction. Difference logic consists of an...
Chao Wang, Aarti Gupta, Malay K. Ganai
CHES
1999
Springer
133views Cryptology» more  CHES 1999»
15 years 8 months ago
Random Number Generators Founded on Signal and Information Theory
The strength of a cryptographic function depends on the amount of entropy in the cryptovariables that are used as keys. Using a large key length with a strong algorithm is false co...
David Paul Maher, Robert J. Rance
SEMCO
2008
IEEE
15 years 11 months ago
Applications of Voting Theory to Information Mashups
Blogs, discussion forums and social networking sites are an excellent source for people’s opinions on a wide range of topics. We examine the application of voting theory to “I...
Alfredo Alba, Varun Bhagwan, Julia Grace, Daniel G...
CGF
2005
98views more  CGF 2005»
15 years 4 months ago
Spectral Volume Rendering based on the Kubelka-Munk Theory
Colour realism plays an important role in computer graphics and visualization. In this paper, we present a new approach to direct volume rendering based on the Kubelka-Munk theory...
Alfie Abdul-Rahman, Min Chen