Sciweavers

861 search results - page 110 / 173
» Predicting Attack-prone Components
Sort
View
TROB
2010
96views more  TROB 2010»
13 years 8 months ago
Stochastic Modular Robotic Systems: A Study of Fluidic Assembly Strategies
Abstract—Modular robotic systems typically assemble using deterministic processes where modules are directly placed into their target position. By contrast, stochastic modular ro...
Michael Thomas Tolley, Michael Kalontarov, Jonas N...
ECRTS
2009
IEEE
13 years 8 months ago
Precise Worst-Case Execution Time Analysis for Processors with Timing Anomalies
This paper explores timing anomalies in WCET analysis. Timing anomalies add to the complexity of WCET analysis and make it hard to apply divide-and-conquer strategies to simplify ...
Raimund Kirner, Albrecht Kadlec, Peter P. Puschner
BIBM
2010
IEEE
173views Bioinformatics» more  BIBM 2010»
13 years 7 months ago
Network-based identification of smoking-associated gene signature for lung cancer
This study presents a novel computational approach to identifying a smoking-associated gene signature. The methodology contains the following steps: 1) identifying genes significa...
Ying-Wooi Wan, Changchang Xiao, Nancy Lan Guo
JMLR
2012
12 years 25 days ago
On Nonparametric Guidance for Learning Autoencoder Representations
Unsupervised discovery of latent representations, in addition to being useful for density modeling, visualisation and exploratory data analysis, is also increasingly important for...
Jasper Snoek, Ryan Prescott Adams, Hugo Larochelle
JIB
2007
124views more  JIB 2007»
13 years 10 months ago
Analysis of integrated biomolecular networks using a generic network analysis suite
The informative value of biomolecular networks has shifted from being solely information resources for possible cellular partners (whether these embody proteins, (ribo)nucleic aci...
Matthias Oesterheld, Hans-Werner Mewes, Volker St&...