Sciweavers

229 search results - page 38 / 46
» Roots of Square: Cryptanalysis of Double-Layer Square and Sq...
Sort
View
FCSC
2007
192views more  FCSC 2007»
13 years 7 months ago
An optimal replication strategy for data grid systems
Data access latency is an important metric of system performance in data grid. By means of efficient replication strategy, the amount of data transferred in wide area network will ...
Jianjin Jiang, Guangwen Yang
IJBRA
2007
95views more  IJBRA 2007»
13 years 7 months ago
A novel stationary wavelet denoising algorithm for array-based DNA Copy Number data
Abstract: High-throughput array-based assays have recently been developed to detect DNA copy number (DCN) aberrations. The DCN data from these arrays is characterized by high level...
Yuhang Wang, Siling Wang
TASLP
2008
136views more  TASLP 2008»
13 years 7 months ago
Distortion Estimation in Compressed Music Using Only Audio Fingerprints
Abstract--An audio fingerprint is a compact yet very robust representation of the perceptually relevant parts of an audio signal. It can be used for content-based audio identificat...
Peter Jan O. Doets, Reginald L. Lagendijk
TSP
2008
157views more  TSP 2008»
13 years 7 months ago
Sequential Monte Carlo Methods for Tracking Multiple Targets With Deterministic and Stochastic Constraints
In multitarget scenarios, kinematic constraints from the interaction of targets with their environment or other targets can restrict target motion. Such motion constraint informati...
Ioannis Kyriakides, Darryl Morrell, Antonia Papand...
WINE
2010
Springer
220views Economy» more  WINE 2010»
13 years 5 months ago
Threshold Models for Competitive Influence in Social Networks
The problem of influence maximization deals with choosing the optimal set of nodes in a social network so as to maximize the resulting spread of a technology (opinion, productowne...
Allan Borodin, Yuval Filmus, Joel Oren