Sciweavers

5131 search results - page 947 / 1027
» Heterogeneous Component Analysis
Sort
View
NAR
2011
225views Computer Vision» more  NAR 2011»
13 years 27 days ago
PHOSIDA 2011: the posttranslational modification database
The primary purpose of PHOSIDA (http://www .phosida.com) is to manage posttranslational modification sites of various species ranging from bacteria to human. Since its last report...
Florian Gnad, Jeremy Gunawardena, Matthias Mann 00...
SIAMSC
2011
140views more  SIAMSC 2011»
13 years 26 days ago
A Fast Parallel Algorithm for Selected Inversion of Structured Sparse Matrices with Application to 2D Electronic Structure Calcu
Abstract. An efficient parallel algorithm is presented and tested for computing selected components of H−1 where H has the structure of a Hamiltonian matrix of two-dimensional la...
Lin Lin, Chao Yang, Jianfeng Lu, Lexing Ying, Wein...
AAAI
2011
12 years 10 months ago
Exploiting Phase Transition in Latent Networks for Clustering
In this paper, we model the pair-wise similarities of a set of documents as a weighted network with a single cutoff parameter. Such a network can be thought of an ensemble of unwe...
Vahed Qazvinian, Dragomir R. Radev
CEJCS
2011
80views more  CEJCS 2011»
12 years 10 months ago
Evaluating distributed real-time and embedded system test correctness using system execution traces
: Effective validation of distributed real-time and embedded (DRE) system quality-of-service (QoS) properties (e.g., event prioritization, latency, and throughput) requires testin...
James H. Hill, Pooja Varshneya, Douglas C. Schmidt
CHES
2011
Springer
254views Cryptology» more  CHES 2011»
12 years 10 months ago
Extractors against Side-Channel Attacks: Weak or Strong?
Randomness extractors are important tools in cryptography. Their goal is to compress a high-entropy source into a more uniform output. Beyond their theoretical interest, they have ...
Marcel Medwed, François-Xavier Standaert