Sciweavers

2226 search results - page 50 / 446
» Computable Analysis via Representations
Sort
View
ICISC
2009
132views Cryptology» more  ICISC 2009»
15 years 1 months ago
Side-Channel Analysis of Cryptographic Software via Early-Terminating Multiplications
Abstract. The design of embedded processors demands a careful tradeoff between many conflicting objectives such as performance, silicon area and power consumption. Finding such a t...
Johann Großschädl, Elisabeth Oswald, Da...
CGI
2004
IEEE
15 years 7 months ago
Range Image Registration via Probability Field
This paper presents a powerful variant of the ICP (Iterative Closest Point) algorithm for registering range images using a probability field. The probability field (p-field) repre...
Haitao Zhang, Olaf A. Hall-Holt, Arie E. Kaufman
129
Voted
BMCBI
2006
150views more  BMCBI 2006»
15 years 4 months ago
Cluster analysis of protein array results via similarity of Gene Ontology annotation
Background: With the advent of high-throughput proteomic experiments such as arrays of purified proteins comes the need to analyse sets of proteins as an ensemble, as opposed to t...
Cheryl Wolting, C. Jane McGlade, David Tritchler
BMCBI
2010
201views more  BMCBI 2010»
15 years 4 months ago
Analysis of X-ray Structures of Matrix Metalloproteinases via Chaotic Map Clustering
Background: Matrix metalloproteinases (MMPs) are well-known biological targets implicated in tumour progression, homeostatic regulation, innate immunity, impaired delivery of pro-...
Ilenia Giangreco, Orazio Nicolotti, Angelo Carotti...
140
Voted
CORR
2010
Springer
129views Education» more  CORR 2010»
15 years 4 months ago
Performance Analysis and Special Issues of Broadband Strategies in the Computer Communication
Broadband communications consists of the technologies and equipment required to deliver packetbased digital voice, video, and data services to end users. Broadband affords end use...
S. S. Riaz Ahamed, D. Mahesh