Sciweavers

28888 search results - page 5748 / 5778
» Computability and complexity in analysis
Sort
View
IJDE
2007
123views more  IJDE 2007»
13 years 9 months ago
Identifying Authorship by Byte-Level N-Grams: The Source Code Author Profile (SCAP) Method
Source code author identification deals with identifying the most likely author of a computer program, given a set of predefined author candidates. There are several scenarios whe...
Georgia Frantzeskou, Efstathios Stamatatos, Stefan...
SIGMETRICS
2008
ACM
121views Hardware» more  SIGMETRICS 2008»
13 years 9 months ago
Disk scrubbing versus intra-disk redundancy for high-reliability raid storage systems
Two schemes proposed to cope with unrecoverable or latent media errors and enhance the reliability of RAID systems are examined. The first scheme is the established, widely used d...
Ilias Iliadis, Robert Haas, Xiao-Yu Hu, Evangelos ...
IJON
2007
88views more  IJON 2007»
13 years 9 months ago
Information maximization in face processing
This perspective paper explores principles of unsupervised learning and how they relate to face recognition. Dependency coding and information maximization appear to be central pr...
Marian Stewart Bartlett
INFORMATICALT
2007
152views more  INFORMATICALT 2007»
13 years 9 months ago
On the Application of Invariant Image Parameters to Fractal Encoding of Bi-Level Images
Abstract. Fractal image compression is an engaging and worthwhile technology that may be successfully applied to still image coding, especially at high compression ratios. Unfortun...
Jonas Valantinas, Tomas Zumbakis
TCBB
2008
137views more  TCBB 2008»
13 years 9 months ago
Toward Verified Biological Models
The last several decades have witnessed a vast accumulation of biological data and data analysis. Many of these data sets represent only a small fraction of the system's behav...
Avital Sadot, Jasmin Fisher, Dan Barak, Yishai Adm...
« Prev « First page 5748 / 5778 Last » Next »