Sciweavers

71 search results - page 13 / 15
» A Novel Approach to Microcalcification Detection Using Fuzzy...
Sort
View
TMC
2012
11 years 9 months ago
Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User
—A number of protocols and mechanisms have been proposed to address the problem of initial secure key deployment in wireless networks. Most existing approaches work either with a...
Toni Perkovic, Mario Cagalj, Toni Mastelic, Nitesh...
VIS
2009
IEEE
399views Visualization» more  VIS 2009»
14 years 8 months ago
Visual Human+Machine Learning
In this paper we describe a novel method to integrate interactive visual analysis and machine learning to support the insight generation of the user. The suggested approach combine...
Raphael Fuchs, Jürgen Waser, Meister Eduard GrÃ...
ISCAS
1999
IEEE
105views Hardware» more  ISCAS 1999»
13 years 11 months ago
Configuration self-test in FPGA-based reconfigurable systems
An FPGA-based reconfigurable system may contain boards of FPGAs which are reconfigured for different applications and must work correctly. This paper presents a novel approach for...
W. Quddus, Abhijit Jas, Nur A. Touba
FUZZIEEE
2007
IEEE
14 years 1 months ago
Mining and Predicting CpG islands
— A DNA sequence can be described as a string composed of four symbols: A, T, C and G. Each symbol represents a chemically distinct nucleotide molecule. Combinations of two nucle...
Christopher Previti, Oscar Harari, Coral del Val
ACSC
2006
IEEE
14 years 1 months ago
Manufacturing opaque predicates in distributed systems for code obfuscation
Code obfuscation is a relatively new technique of software protection and it works by deterring reverse engineering attempts by malicious users of software. The objective of obfus...
Anirban Majumdar, Clark D. Thomborson