Sciweavers

780 search results - page 120 / 156
» A New Identification Scheme Based on the Perceptrons Problem
Sort
View
IWNAS
2008
IEEE
14 years 1 months ago
Event-based Trust Framework Model in Wireless Sensor Networks
The security of wireless sensor networks is ever more important nowadays. Most of the proposed security protocols in wireless sensor networks are based on authentication and encry...
Haiguang Chen, Huafeng Wu, Jinchu Hu, Chuanshan Ga...
SODA
1998
ACM
114views Algorithms» more  SODA 1998»
13 years 9 months ago
Exact Arithmetic at Low Cost - A Case Study in Linear Programming
We describe a new exact-arithmetic approach to linear programming when the number of variables n is much larger than the number of constraints m (or vice versa). The algorithm is ...
Bernd Gärtner
BMCBI
2008
129views more  BMCBI 2008»
13 years 7 months ago
Motif-directed network component analysis for regulatory network inference
Background: Network Component Analysis (NCA) has shown its effectiveness in discovering regulators and inferring transcription factor activities (TFAs) when both microarray data a...
Chen Wang, Jianhua Xuan, Li Chen, Po Zhao, Yue Wan...
ICDE
2008
IEEE
137views Database» more  ICDE 2008»
14 years 9 months ago
Multiple Materialized View Selection for XPath Query Rewriting
We study the problem of answering XPATH queries using multiple materialized views. Despite the efforts on answering queries using single materialized view, answering queries using ...
Byron Choi, Jeffrey Xu Yu, Kam-Fai Wong, M. Tamer ...
TMI
2008
135views more  TMI 2008»
13 years 7 months ago
A Factorization Approach for Cone-Beam Reconstruction on a Circular Short-Scan
In this paper, we introduce a new algorithm for 3-D image reconstruction from cone-beam (CB) projections acquired along a partial circular scan. Our algorithm is based on a novel, ...
Frank Dennerlein, Frédéric Noo, H. S...