Sciweavers

367 search results - page 41 / 74
» An overview of reservoir computing: theory, applications and...
Sort
View
CANDT
2009
14 years 17 days ago
Analyzing (social media) networks with NodeXL
We present NodeXL, an extendible toolkit for network overview, discovery and exploration implemented as an add-in to the Microsoft Excel 2007 spreadsheet software. We demonstrate ...
Marc A. Smith, Ben Shneiderman, Natasa Milic-Frayl...
IHI
2010
173views Healthcare» more  IHI 2010»
13 years 3 months ago
Towards large-scale sharing of electronic health records of cancer patients
The rising cost of healthcare is one of the major concerns faced by the nation. One way to lower healthcare costs and provide better quality care to patients is through the effect...
Praveen R. Rao, Stanley A. Edlavitch, Jeffrey L. H...
ALGORITHMICA
2006
77views more  ALGORITHMICA 2006»
13 years 8 months ago
Scalable Parallel Algorithms for FPT Problems
Algorithmic methods based on the theory of fixed-parameter tractability are combined with powerful computational platforms to launch systematic attacks on combinatorial problems o...
Faisal N. Abu-Khzam, Michael A. Langston, Pushkar ...
MMSEC
2006
ACM
129views Multimedia» more  MMSEC 2006»
14 years 2 months ago
WLAN steganography: a first practical review
Two different approaches for constructing a steganographic channel in an IEEE 802.11 (WLAN) network are introduced in this paper. First test results on the reliability, undetectab...
Christian Krätzer, Jana Dittmann, Andreas Lan...
CAV
2012
Springer
236views Hardware» more  CAV 2012»
11 years 11 months ago
Lock Removal for Concurrent Trace Programs
Abstract. We propose a trace-based concurrent program analysis to soundly remove redundant synchronizations such as locks while preserving the behaviors of the concurrent computati...
Vineet Kahlon, Chao Wang