Sciweavers

11716 search results - page 2123 / 2344
» Computable symbolic dynamics
Sort
View
JDCTA
2010
175views more  JDCTA 2010»
13 years 5 months ago
Evolution Cipher against Differential Power Attack
: Differntial Power Attack (DPA) is one kind of Side Channel Attacks (SCAs). There are two phases in DPA attacks: sample collection and statistical analysis, which can be utilized ...
Shubo Liu, Ming Tang, Si Gao, Huanguo Zhang
JDCTA
2010
148views more  JDCTA 2010»
13 years 5 months ago
Web Services Supervision System Based on Jade
Web service technology is one of the trend technologies in computer science now, and recently with the rapid growth of web services deployed with the same functionality, many rese...
Ahmed Sallam, Zhiyong Li, Shaimaa Hassan
JMLR
2010
108views more  JMLR 2010»
13 years 5 months ago
Feature Selection using Multiple Streams
Feature selection for supervised learning can be greatly improved by making use of the fact that features often come in classes. For example, in gene expression data, the genes wh...
Paramveer S. Dhillon, Dean P. Foster, Lyle H. Unga...
MMAS
2010
Springer
13 years 5 months ago
Global Energy Matching Method for Atomistic-to-Continuum Modeling of Self-Assembling Biopolymer Aggregates
This paper studies mathematical models of biopolymer supramolecular aggregates that are formed by the self-assembly of single monomers. We develop a new multiscale numerical appro...
Lei Zhang, Leonid Berlyand, Maxim V. Fedorov, Houm...
PC
2010
101views Management» more  PC 2010»
13 years 5 months ago
An efficient parallel implementation of the MSPAI preconditioner
We present an efficient implementation of the Modified SParse Approximate Inverse (MSPAI) preconditioner. MSPAI generalizes the class of preconditioners based on Frobenius norm mi...
Thomas Huckle, A. Kallischko, A. Roy, M. Sedlacek,...
« Prev « First page 2123 / 2344 Last » Next »