Sciweavers

221 search results - page 6 / 45
» Data Hiding Techniques Using Prime and Natural Numbers
Sort
View
CISS
2008
IEEE
14 years 1 months ago
Improved bounds for a deterministic sublinear-time Sparse Fourier Algorithm
—This paper improves on the best-known runtime and measurement bounds for a recently proposed Deterministic sublinear-time Sparse Fourier Transform algorithm (hereafter called DS...
Mark A. Iwen, Craig V. Spencer
BIRTHDAY
2009
Springer
13 years 8 months ago
Towards the Automatic Acquisition of a Valence Dictionary for Polish
This article presents the evaluation of a valence dictionary for Polish produced with the help of shallow parsing techniques and compares those results to earlier results involving...
Adam Przepiórkowski
BMCBI
2007
156views more  BMCBI 2007»
13 years 7 months ago
Large-scale clustering of CAGE tag expression data
Background: Recent analyses have suggested that many genes possess multiple transcription start sites (TSSs) that are differentially utilized in different tissues and cell lines. ...
Kazuro Shimokawa, Yuko Okamura-Oho, Takio Kurita, ...
PPOPP
2009
ACM
14 years 8 months ago
A compiler-directed data prefetching scheme for chip multiprocessors
Data prefetching has been widely used in the past as a technique for hiding memory access latencies. However, data prefetching in multi-threaded applications running on chip multi...
Dhruva Chakrabarti, Mahmut T. Kandemir, Mustafa Ka...
SIGMOD
2008
ACM
198views Database» more  SIGMOD 2008»
14 years 7 months ago
Efficient storage scheme and query processing for supply chain management using RFID
As the size of an RFID tag becomes smaller and the price of the tag gets lower, RFID technology has been applied to a wide range of areas. Recently, RFID has been adopted in the b...
Chun-Hee Lee, Chin-Wan Chung