Sciweavers

377 search results - page 53 / 76
» Accelerating Large Data Analysis by Exploiting Regularities
Sort
View
TCSV
2002
119views more  TCSV 2002»
13 years 6 months ago
VLSI architecture design of MPEG-4 shape coding
This paper presents an efficient VLSI architecture design of MPEG-4 shape coding, which is the key technology for supporting the content-based functionality of the MPEG-4 Video sta...
Hao-Chieh Chang, Yung-Chi Chang, Yi-Chu Wang, Wei-...
MCS
2004
Springer
14 years 3 days ago
Multiple Classifiers System for Reducing Influences of Atypical Observations
Atypical observations, which are called outliers, are one of difficulties to apply standard Gaussian density based pattern classification methods. Large number of outliers makes di...
Sarunas Raudys, Masakazu Iwamura
ESORICS
2004
Springer
14 years 4 days ago
ARCHERR: Runtime Environment Driven Program Safety
Parameters of a program’s runtime environment such as the machine architecture and operating system largely determine whether a vulnerability can be exploited. For example, the m...
Ramkumar Chinchani, Anusha Iyer, Bharat Jayaraman,...
ICCD
2008
IEEE
142views Hardware» more  ICCD 2008»
14 years 3 months ago
Making register file resistant to power analysis attacks
— Power analysis attacks are a type of side-channel attacks that exploits the power consumption of computing devices to retrieve secret information. They are very effective in br...
Shuo Wang, Fan Zhang, Jianwei Dai, Lei Wang, Zhiji...
BMCBI
2007
124views more  BMCBI 2007»
13 years 6 months ago
Analysis on multi-domain cooperation for predicting protein-protein interactions
Background: Domains are the basic functional units of proteins. It is believed that protein-protein interactions are realized through domain interactions. Revealing multi-domain c...
Rui-Sheng Wang, Yong Wang, Ling-Yun Wu, Xiang-Sun ...