Sciweavers

2309 search results - page 120 / 462
» Efficient Topological Exploration
Sort
View
AIIA
2009
Springer
14 years 2 months ago
Mathematical Symbol Indexing
This paper addresses the indexing and retrieval of mathematical symbols from digitized documents. The proposed approach exploits Shape Contexts (SC) to describe the shape of mathe...
Simone Marinai, Beatrice Miotti, Giovanni Soda
ISLPED
2006
ACM
129views Hardware» more  ISLPED 2006»
14 years 2 months ago
Variation-driven device sizing for minimum energy sub-threshold circuits
Sub-threshold operation is a compelling approach for energyconstrained applications, but increased sensitivity to variation must be mitigated. We explore variability metrics and t...
Joyce Kwong, Anantha P. Chandrakasan
SASN
2006
ACM
14 years 2 months ago
Achieving privacy in mesh networks
Mesh network is vulnerable to privacy attacks because of the open medium property of wireless channel, the fixed topology, and the limited network size. Traditional anonymous rou...
Xiaoxin Wu, Ninghui Li
CEC
2005
IEEE
14 years 1 months ago
Evolving hidden Markov models for protein secondary structure prediction
New results are presented for the prediction of secondary structure information for protein sequences using Hidden Markov Models (HMMs) evolved using a Genetic Algorithm (GA). We a...
Kyoung-Jae Won, Thomas Hamelryck, Adam Prügel...
TIT
2010
125views Education» more  TIT 2010»
13 years 2 months ago
Target detection via network filtering
A method of `network filtering' has been proposed recently to detect the effects of certain external perturbations on the interacting members in a network. However, with larg...
Shu Yang, Eric D. Kolaczyk