Sciweavers

438 search results - page 73 / 88
» Design and Analysis of Password-Based Key Derivation Functio...
Sort
View
CVPR
2007
IEEE
14 years 9 months ago
Feature Mining for Image Classification
The efficiency and robustness of a vision system is often largely determined by the quality of the image features available to it. In data mining, one typically works with immense...
Piotr Dollár, Zhuowen Tu, Hai Tao, Serge Be...
PDCN
2004
13 years 8 months ago
Quality-of-service provisioning system for multimedia transmission in IEEE 802.11 wireless lans
IEEE 802.11, the standard of wireless local area networks (WLANs), allows the coexistence of asynchronous and time-bounded traffic using the distributed coordination function (DCF)...
Joseph Deng, Hsu-Chun Yen
SIGSOFT
2008
ACM
14 years 8 months ago
Requirements engineering: from craft to discipline
Getting the right software requirements under the right environment assumptions is a critical precondition for developing the right software. This task is intrinsically difficult....
Axel van Lamsweerde
BMCBI
2010
147views more  BMCBI 2010»
13 years 7 months ago
baySeq: Empirical Bayesian methods for identifying differential expression in sequence count data
Background: High throughput sequencing has become an important technology for studying expression levels in many types of genomic, and particularly transcriptomic, data. One key w...
Thomas J. Hardcastle, Krystyna A. Kelly
ALGORITHMICA
1998
73views more  ALGORITHMICA 1998»
13 years 7 months ago
Linear Probing and Graphs
Mallows and Riordan showed in 1968 that labeled trees with a small number of inversions are related to labeled graphs that are connected and sparse. Wright enumerated sparse connec...
Donald E. Knuth