Sciweavers

2252 search results - page 342 / 451
» Improving Random Forests
Sort
View
ICCSA
2005
Springer
14 years 3 months ago
Sinogram Denoising of Cryo-Electron Microscopy Images
Cryo-electron microscopy has recently been recognized as a useful alternative to obtain three-dimensional density maps of macromolecular complexes, especially when crystallography ...
Taneli Mielikäinen, Janne Ravantti
ICDCIT
2005
Springer
14 years 3 months ago
Self-stabilizing Deterministic TDMA for Sensor Networks
An algorithm for time division multiple access (TDMA) is desirable in sensor networks for energy management, as it allows a sensor to reduce the amount of idle listening. Also, TD...
Mahesh Arumugam, Sandeep S. Kulkarni
ICES
2005
Springer
176views Hardware» more  ICES 2005»
14 years 3 months ago
Consensus-Based Evaluation for Fault Isolation and On-line Evolutionary Regeneration
While the fault repair capability of Evolvable Hardware (EH) approaches have been previously demonstrated, further improvements to fault handling capability can be achieved by exp...
Kening Zhang, Ronald F. DeMara, Carthik A. Sharma
IMA
2005
Springer
126views Cryptology» more  IMA 2005»
14 years 3 months ago
Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme
Abstract. Identity-based encryption (IBE) is a special asymmetric encryption method where a public encryption key can be an arbitrary identifier and the corresponding private decr...
Liqun Chen, Zhaohui Cheng
IPTPS
2005
Springer
14 years 3 months ago
A First Look at Peer-to-Peer Worms: Threats and Defenses
Abstract— Peer-to-peer (P2P) worms exploit common vulnerabilities in member hosts of a P2P network and spread topologically in the P2P network, a potentially more effective strat...
Lidong Zhou, Lintao Zhang, Frank McSherry, Nicole ...