Sciweavers

9119 search results - page 1808 / 1824
» A Simultaneous Search Problem
Sort
View
TC
2008
13 years 7 months ago
Cryptanalysis with COPACOBANA
Cryptanalysis of ciphers usually involves massive computations. The security parameters of cryptographic algorithms are commonly chosen so that attacks are infeasible with availabl...
Tim Güneysu, Timo Kasper, Martin Novotn&yacut...
ASE
2005
140views more  ASE 2005»
13 years 7 months ago
Automated Procedure Construction for Deductive Synthesis
Deductive program synthesis systems based on automated theorem proving offer the promise of software that is correct by construction. However, the difficulty encountered in constru...
Steve Roach, Jeffrey Van Baalen
TIP
2008
287views more  TIP 2008»
13 years 7 months ago
3-D Object Recognition Using 2-D Views
We consider the problem of recognizing 3-D objects from 2-D images using geometric models and assuming different viewing angles and positions. Our goal is to recognize and localize...
Wenjing Li, George Bebis, Nikolaos G. Bourbakis
BMCBI
2005
117views more  BMCBI 2005»
13 years 7 months ago
Graph-representation of oxidative folding pathways
Background: The process of oxidative folding combines the formation of native disulfide bond with conformational folding resulting in the native three-dimensional fold. Oxidative ...
Vilmos Ágoston, Masa Cemazar, Lászl&...
BMCBI
2005
122views more  BMCBI 2005»
13 years 7 months ago
GenClust: A genetic algorithm for clustering gene expression data
Background: Clustering is a key step in the analysis of gene expression data, and in fact, many classical clustering algorithms are used, or more innovative ones have been designe...
Vito Di Gesù, Raffaele Giancarlo, Giosu&egr...
« Prev « First page 1808 / 1824 Last » Next »