Sciweavers

1004 search results - page 150 / 201
» A comparison of generalized linear discriminant analysis alg...
Sort
View
IWSEC
2010
Springer
13 years 7 months ago
Optimal Adversary Behavior for the Serial Model of Financial Attack Trees
Abstract. Attack tree analysis is used to estimate different parameters of general security threats based on information available for atomic subthreats. We focus on estimating the...
Margus Niitsoo
RECOMB
2004
Springer
14 years 9 months ago
Designing multiple simultaneous seeds for DNA similarity search
The challenge of similarity search in massive DNA sequence databases has inspired major changes in BLAST-style alignment tools, which accelerate search by inspecting only pairs of...
Yanni Sun, Jeremy Buhler
ASPDAC
2005
ACM
118views Hardware» more  ASPDAC 2005»
13 years 10 months ago
Wideband modeling of RF/Analog circuits via hierarchical multi-point model order reduction
This paper proposes a novel wideband modeling technique for high-performance RF passives and linear(ized) analog circuits. The new method is based on a recently proposed sdomain h...
Zhenyu Qi, Sheldon X.-D. Tan, Hao Yu, Lei He
DAC
2005
ACM
13 years 10 months ago
How accurately can we model timing in a placement engine?
This paper presents a novel placement algorithm for timing optimization based on a new and powerful concept, which we term differential timing analysis. Recognizing that accurate ...
Amit Chowdhary, Karthik Rajagopal, Satish Venkates...
JACM
2010
116views more  JACM 2010»
13 years 7 months ago
The complexity of temporal constraint satisfaction problems
A temporal constraint language is a set of relations that has a first-order definition in (Q, <), the dense linear order of the rational numbers. We present a complete comple...
Manuel Bodirsky, Jan Kára