Sciweavers

1737 search results - page 188 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
JCP
2008
119views more  JCP 2008»
15 years 5 months ago
Performance Comparisons, Design, and Implementation of RC5 Symmetric Encryption Core using Reconfigurable Hardware
With the wireless communications coming to homes and offices, the need to have secure data transmission is of utmost importance. Today, it is important that information is sent con...
Omar S. Elkeelany, Adegoke Olabisi
PLDI
2006
ACM
15 years 11 months ago
SAFECode: enforcing alias analysis for weakly typed languages
Static analysis of programs in weakly typed languages such as C and C++ is generally not sound because of possible memory errors due to dangling pointer references, uninitialized ...
Dinakar Dhurjati, Sumant Kowshik, Vikram S. Adve
BMCBI
2010
97views more  BMCBI 2010»
15 years 3 days ago
A semi-parametric Bayesian model for unsupervised differential co-expression analysis
Background: Differential co-expression analysis is an emerging strategy for characterizing disease related dysregulation of gene expression regulatory networks. Given pre-defined ...
Johannes M. Freudenberg, Siva Sivaganesan, Michael...
ISNN
2005
Springer
15 years 10 months ago
Neural Network Based Online Feature Selection for Vehicle Tracking
Abstract. Aiming at vehicle tracking with a single moving camera for autonomous driving, this paper presents a strategy of online feature selection combined with related process fr...
Tie Liu, Nanning Zheng, Hong Cheng
FLAIRS
2008
15 years 7 months ago
Fuzzy Clustering Paradigm and the Shape-Based Image Retrieval
This paper presents a strategy for shape-based image retrieval in which moment invariants form a feature vector to describe the shape of an object. Fuzzy k-means clustering is use...
Nan Xing, Imran Shafiq Ahmad