Sciweavers

571 search results - page 47 / 115
» On a high order numerical method for functions with singular...
Sort
View
APWEB
2004
Springer
14 years 1 months ago
Semantic, Hierarchical, Online Clustering of Web Search Results
Today, search engine is the most commonly used tool for Web information retrieval, however, its current status is still far from satisfaction. This paper focuses on clustering Web...
Dell Zhang, Yisheng Dong
ICCD
2004
IEEE
137views Hardware» more  ICCD 2004»
14 years 4 months ago
Comparative Study of Strategies for Formal Verification of High-Level Processors
Compared are different methods for evaluation of formulas expressing microprocessor correctness in the logic of Equality with Uninterpreted Functions and Memories (EUFM) by transl...
Miroslav N. Velev
IMA
1999
Springer
69views Cryptology» more  IMA 1999»
13 years 12 months ago
Some Applications of Bounds for Designs to the Cryptography
Recent years have seen numerous examples when designs play an important role in the study of such topics in cryptography as secrecy and authentication codes, secret sharing scheme...
Svetla Nikova, Ventzislav Nikov
JCP
2007
108views more  JCP 2007»
13 years 7 months ago
A Genetic Algorithm Method to Assimilate Sensor Data for a Toxic Contaminant Release
— Following a toxic contaminant release, either accidental or intentional, predicting the transport and dispersion of the contaminant becomes a critical problem for Homeland Defe...
Sue Ellen Haupt, George S. Young, Christopher T. A...
ISBI
2006
IEEE
14 years 8 months ago
Joint estimation in MRI using harmonic retrieval methods
One of the key factors affecting functional MRI image reconstruction is field inhomogeneity. It is desirable to estimate both the distortion-free MRI image and field map simultane...
Hien M. Nguyen, Robert L. Morrison Jr., Bradley P....