Sciweavers

349 search results - page 56 / 70
» Symmetrically exploiting XML
Sort
View
CG
2008
Springer
13 years 10 months ago
Parallel reflective symmetry transformation for volume data
Many volume data possess symmetric features that can be clearly observed, for example, those existing in diffusion tensor image data sets. The exploitations of symmetries for volu...
Yuan Hong, Han-Wei Shen
CORR
2008
Springer
106views Education» more  CORR 2008»
13 years 10 months ago
GossiCrypt: Wireless Sensor Network Data Confidentiality Against Parasitic Adversaries
Resource and cost constraints remain a challenge for wireless sensor network security. In this paper, we propose a new approach to protect confidentiality against a parasitic adver...
Jun Luo, Panos Papadimitratos, Jean-Pierre Hubaux
CORR
2008
Springer
129views Education» more  CORR 2008»
13 years 10 months ago
Polynomial Linear Programming with Gaussian Belief Propagation
Abstract--Interior-point methods are state-of-the-art algorithms for solving linear programming (LP) problems with polynomial complexity. Specifically, the Karmarkar algorithm typi...
Danny Bickson, Yoav Tock, Ori Shental, Danny Dolev
JAIR
2008
94views more  JAIR 2008»
13 years 9 months ago
The Ultrametric Constraint and its Application to Phylogenetics
A phylogenetic tree shows the evolutionary relationships among species. Internal nodes of the tree represent speciation events and leaf nodes correspond to species. A goal of phyl...
Neil C. A. Moore, Patrick Prosser
JNS
2008
63views more  JNS 2008»
13 years 9 months ago
Numerical Continuation of Hamiltonian Relative Periodic Orbits
The bifurcation theory and numerics of periodic orbits of general dynamical systems is well developed, and in recent years there has been rapid progress in the development of a bi...
Claudia Wulff, Andreas Schebesch