Sciweavers

178 search results - page 30 / 36
» An Analysis of (Linear) Exponentials Based on Extended Seque...
Sort
View
PODC
2006
ACM
14 years 1 months ago
Computing separable functions via gossip
Motivated by applications to sensor, peer-to-peer, and adhoc networks, we study the problem of computing functions of values at the nodes in a network in a totally distributed man...
Damon Mosk-Aoyama, Devavrat Shah
ICIP
2006
IEEE
14 years 9 months ago
Facial Expression Recognition using Advanced Local Binary Patterns, Tsallis Entropies and Global Appearance Features
This paper proposes a novel facial expression recognition approach based on two sets of features extracted from the face images: texture features and global appearance features. T...
Shu Liao, Wei Fan, Albert C. S. Chung, Dit-Yan Yeu...
ACNS
2011
Springer
231views Cryptology» more  ACNS 2011»
12 years 11 months ago
Cold Boot Key Recovery by Solving Polynomial Systems with Noise
A method for extracting cryptographic key material from DRAM used in modern computers has been recently proposed in [9]; the technique was called Cold Boot attacks. When considerin...
Martin Albrecht, Carlos Cid
MOBIHOC
2008
ACM
14 years 7 months ago
Dynamic packet fragmentation for wireless channels with failures
It was shown recently [7?9], under quite general conditions, that retransmission-based protocols may result in power-law delays and possibly zero throughput even if the distributi...
Predrag R. Jelenkovic, Jian Tan
BMCBI
2006
128views more  BMCBI 2006»
13 years 7 months ago
Comparative assessment of performance and genome dependence among phylogenetic profiling methods
Background: The rapidly increasing speed with which genome sequence data can be generated will be accompanied by an exponential increase in the number of sequenced eukaryotes. Wit...
Evan S. Snitkin, Adam M. Gustafson, Joseph C. Mell...