Sciweavers

1562 search results - page 305 / 313
» A case study in testing a network security algorithm
Sort
View
BIBM
2007
IEEE
137views Bioinformatics» more  BIBM 2007»
14 years 1 months ago
A Multi-metric Similarity Based Analysis of Microarray Data
Clustering has been shown to be effective in analyzing functional relationships of genes. However, no single clustering method with single distance metric is capable of capturing ...
Fatih Altiparmak, Selnur Erdal, Ozgur Ozturk, Haka...
ICRA
2009
IEEE
121views Robotics» more  ICRA 2009»
14 years 2 months ago
Exploiting angular momentum to enhance bipedal center-of-mass control
Abstract— Recent humanoid control investigations have emphasized the importance of controlling whole-body angular momentum throughout a movement task. For typical movement tasks,...
Andreas Hofmann, Marko B. Popovic, Hugh M. Herr
WISE
2007
Springer
14 years 1 months ago
On Tree Pattern Query Rewriting Using Views
We study and present our findings on two closely related problems on xpath rewriting using views when both the view and the query are tree patterns involving /,// and []. First, g...
Junhu Wang, Jeffrey Xu Yu, Chengfei Liu
IPPS
1997
IEEE
13 years 11 months ago
External Adjustment of Runtime Parameters in Time Warp Synchronized Parallel Simulators
Several optimizations to the Time Warp synchronization protocol for parallel discrete event simulation have been proposed and studied. Many of these optimizations have included so...
Radharamanan Radhakrishnan, Lantz Moore, Philip A....
COLT
2008
Springer
13 years 9 months ago
An Information Theoretic Framework for Multi-view Learning
In the multi-view learning paradigm, the input variable is partitioned into two different views X1 and X2 and there is a target variable Y of interest. The underlying assumption i...
Karthik Sridharan, Sham M. Kakade