Sciweavers

1405 search results - page 35 / 281
» We Are No Longer A Priesthood
Sort
View
78
Voted
ICICS
2009
Springer
15 years 4 months ago
Design of Reliable and Secure Multipliers by Multilinear Arithmetic Codes
Abstract. We propose an efficient technique for the detection of errors in cryptographic circuits introduced by strong adversaries. Previously a number of linear and nonlinear err...
Zhen Wang, Mark G. Karpovsky, Berk Sunar, Ajay Jos...
ICASSP
2008
IEEE
15 years 4 months ago
Second-order near-field localization with automatic paring operation
Most exiting array signal processing techniques for bearing estimation are strongly relied on the far-field assumption. When the sources are located close to the array, these tec...
Rémy Boyer, José Picheral
ISORC
2008
IEEE
15 years 3 months ago
On Collaborative Scheduling of Distributable Real-Time Threads in Dynamic, Networked Embedded Systems
Some emerging networked embedded real-time applications have relatively long reaction time magnitudes—e.g., milliseconds to minutes. These longer execution time magnitudes allow...
Sherif Fadel Fahmy, Binoy Ravindran, E. Douglas Je...
AAIM
2008
Springer
110views Algorithms» more  AAIM 2008»
15 years 3 months ago
Fixed-Parameter Algorithms for Kemeny Scores
The Kemeny Score problem is central to many applications in the context of rank aggregation. Given a set of permutations (votes) over a set of candidates, one searches for a “con...
Nadja Betzler, Michael R. Fellows, Jiong Guo, Rolf...
CEC
2007
IEEE
15 years 3 months ago
A co-evolutionary framework for regulatory motif discovery
Abstract— In previous work, we have shown how an evolutionary algorithm with a clustered population can be used to concurrently discover multiple regulatory motifs present within...
Michael A. Lones, Andy M. Tyrrell