Sciweavers

13593 search results - page 2675 / 2719
» Performance Analysis of MD5
Sort
View
AES
2005
Springer
137views Cryptology» more  AES 2005»
13 years 11 months ago
Design of a multimedia processor based on metrics computation
Media-processing applications, such as signal processing, 2D and 3D graphics rendering, and image compression, are the dominant workloads in many embedded systems today. The real-...
Nader Ben Amor, Yannick Le Moullec, Jean-Philippe ...
AI
2005
Springer
13 years 11 months ago
Choosing words in computer-generated weather forecasts
One of the main challenges in automatically generating textual weather forecasts is choosing appropriate English words to communicate numeric weather data. A corpus-based analysis...
Ehud Reiter, Somayajulu Sripada, Jim Hunter, Jin Y...
SP
2008
IEEE
134views Security Privacy» more  SP 2008»
13 years 11 months ago
Discover gene specific local co-regulations from time-course gene expression data
Discovering gene co-regulatory relationships is one of most important research in DNA microarray data analysis. The problem of gene specific co-regulation discovery is to, for a p...
Ji Zhang, Qigang Gao, Hai H. Wang
IJON
2007
88views more  IJON 2007»
13 years 11 months ago
Information maximization in face processing
This perspective paper explores principles of unsupervised learning and how they relate to face recognition. Dependency coding and information maximization appear to be central pr...
Marian Stewart Bartlett
TC
2008
13 years 11 months ago
The Convergence-Guaranteed Random Walk and Its Applications in Peer-to-Peer Networks
Network structure construction and global state maintenance are expensive in large-scale, dynamic peer-to-peer (p2p) networks. With inherent topology independence and low state mai...
Ming Zhong, Kai Shen, Joel I. Seiferas
« Prev « First page 2675 / 2719 Last » Next »