Sciweavers

4272 search results - page 854 / 855
» A Case for Automatic System Evaluation
Sort
View
KIC
2000
13 years 9 months ago
Knowledge Discovery and Data Mining within a Design Environment
Designers, in the process of satisfying design requirements, generally encounter difficulties in, firstly, understanding the problem and secondly, finding a solution [Cross 1998]....
Mark K. D. Haffey, Alex H. B. Duffy
CORR
2010
Springer
131views Education» more  CORR 2010»
13 years 7 months ago
Ergodic and Outage Performance of Fading Broadcast Channels with 1-Bit Feedback
In this paper, the ergodic sum-rate and outage probability of a downlink single-antenna channel with K users are analyzed in the presence of Rayleigh flat fading, where limited cha...
Bo Niu, Osvaldo Simeone, Oren Somekh, Alexander M....
FDTC
2010
Springer
132views Cryptology» more  FDTC 2010»
13 years 5 months ago
Fault Injection Resilience
Fault injections constitute a major threat to the security of embedded systems. The errors in the cryptographic algorithms have been shown to be extremely dangerous, since powerful...
Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger,...
IPPS
2010
IEEE
13 years 5 months ago
Distributed monitoring of conditional entropy for anomaly detection in streams
In this work we consider the problem of monitoring information streams for anomalies in a scalable and efficient manner. We study the problem in the context of network streams wher...
Chrisil Arackaparambil, Sergey Bratus, Joshua Brod...
BMCBI
2011
13 years 2 months ago
A discriminative method for family-based protein remote homology detection that combines inductive logic programming and proposi
Background: Remote homology detection is a hard computational problem. Most approaches have trained computational models by using either full protein sequences or multiple sequenc...
Juliana S. Bernardes, Alessandra Carbone, Gerson Z...