Sciweavers

1659 search results - page 52 / 332
» From Functional Analysis to Iterative Methods
Sort
View
MTV
2005
IEEE
138views Hardware» more  MTV 2005»
14 years 2 months ago
Diagnosing Faulty Functional Units in Processors by Using Automatically Generated Test Sets
Microprocessor technology is increasingly used for many applications; the large market volumes call for cost containment in the production phase. Process yield for processor produ...
Paolo Bernardi, Ernesto Sánchez, Massimilia...
JBI
2004
171views Bioinformatics» more  JBI 2004»
13 years 10 months ago
Consensus Clustering and Functional Interpretation of Gene Expression Data
Microarray analysis using clustering algorithms can suffer from lack of inter-method consistency in assigning related gene-expression profiles to clusters. Obtaining a consensus s...
Paul Kellam, Stephen Swift, Allan Tucker, Veronica...
BMCBI
2006
175views more  BMCBI 2006»
13 years 9 months ago
Parameter estimation for stiff equations of biosystems using radial basis function networks
Background: The modeling of dynamic systems requires estimating kinetic parameters from experimentally measured time-courses. Conventional global optimization methods used for par...
Yoshiya Matsubara, Shinichi Kikuchi, Masahiro Sugi...
TABLETOP
2007
IEEE
14 years 3 months ago
Examination of Text-Entry Methods for Tabletop Displays
Although text entry is a vital part of day-to-day computing familiar to most people, not much research has been done to enable text entry on large interactive tables. One might as...
Uta Hinrichs, Mark S. Hancock, M. Sheelagh T. Carp...
CRYPTO
2007
Springer
149views Cryptology» more  CRYPTO 2007»
14 years 1 months ago
Hash Functions and the (Amplified) Boomerang Attack
Abstract. Since Crypto 2004, hash functions have been the target of many attacks which showed that several well-known functions such as SHA-0 or MD5 can no longer be considered sec...
Antoine Joux, Thomas Peyrin