Sciweavers

11488 search results - page 2002 / 2298
» Robust optimization - methodology and applications
Sort
View
ADBIS
2004
Springer
124views Database» more  ADBIS 2004»
15 years 9 months ago
Database Caching - Towards a Cost Model for Populating Cache Groups
Web caching keeps single Web objects ready somewhere in caches in the user-to-server path, whereas database caching uses fullfledged database management systems as caches to adapt...
Theo Härder, Andreas Bühmann
CTRSA
2004
Springer
114views Cryptology» more  CTRSA 2004»
15 years 9 months ago
Flexible Hardware Design for RSA and Elliptic Curve Cryptosystems
This paper presents a scalable hardware implementation of both commonly used public key cryptosystems, RSA and Elliptic Curve Cryptosystem (ECC) on the same platform. The introduce...
Lejla Batina, Geeke Bruin-Muurling, Siddika Berna ...
DEXA
2004
Springer
103views Database» more  DEXA 2004»
15 years 9 months ago
Characterizing Database User's Access Patterns
Much work has been done on characterizing the workload of a database system. Previous studies focused on providing different types of statistical summaries, and modeling the run-ti...
Qingsong Yao, Aijun An
ECCV
2004
Springer
15 years 9 months ago
Null Space Approach of Fisher Discriminant Analysis for Face Recognition
The null space of the within-class scatter matrix is found to express most discriminative information for the small sample size problem (SSSP). The null space-based LDA takes full ...
Wei Liu, Yunhong Wang, Stan Z. Li, Tieniu Tan
EUROGP
2004
Springer
105views Optimization» more  EUROGP 2004»
15 years 9 months ago
Evolved Matrix Operations for Post-processing Protein Secondary Structure Predictions
Predicting the three-dimensional structure of proteins is a hard problem, so many have opted instead to predict the secondary structural state (usually helix, strand or coil) of e...
Varun Aggarwal, Robert M. MacCallum
« Prev « First page 2002 / 2298 Last » Next »