Sciweavers

109 search results - page 4 / 22
» On the Weakenesses of Correlation
Sort
View
SIGSOFT
2004
ACM
14 years 27 days ago
Correlation exploitation in error ranking
Static program checking tools can find many serious bugs in software, but due to analysis limitations they also frequently emit false error reports. Such false positives can easi...
Ted Kremenek, Ken Ashcraft, Junfeng Yang, Dawson R...
JUCS
2010
134views more  JUCS 2010»
13 years 6 months ago
Track-To-Track Measurement Fusion Architectures and Correlation Analysis
: The purpose of this paper is to address some theoretical issues related to the track-to-track fusion problem when the measurements tracking the same target are inherently correla...
Mourad Oussalah, Zahir Messaoudi, Abdelaziz Ouldal...
BMCBI
2007
148views more  BMCBI 2007»
13 years 7 months ago
fREDUCE: Detection of degenerate regulatory elements using correlation with expression
Background: The precision of transcriptional regulation is made possible by the specificity of physical interactions between transcription factors and their cognate binding sites ...
Randy Z. Wu, Christina Chaivorapol, Jiashun Zheng,...
CRYPTO
2004
Springer
120views Cryptology» more  CRYPTO 2004»
14 years 26 days ago
Pseudo-signatures, Broadcast, and Multi-party Computation from Correlated Randomness
Unconditionally secure multi-party computations in general, and broadcast in particular, are impossible if any third of the players can be actively corrupted and if no additional i...
Matthias Fitzi, Stefan Wolf, Jürg Wullschlege...
ICRA
2009
IEEE
83views Robotics» more  ICRA 2009»
14 years 2 months ago
Real-time correlative scan matching
— Scan matching, the problem of registering two laser scans in order to determine the relative positions from which the scans were obtained, is one of the most heavily relied-upo...
Edwin B. Olson