Sciweavers

905 search results - page 88 / 181
» The Case Against Micropayments
Sort
View
BMCBI
2007
107views more  BMCBI 2007»
13 years 9 months ago
Linking microarray reporters with protein functions
Background: The analysis of microarray experiments requires accurate and up-to-date functional annotation of the microarray reporters to optimize the interpretation of the biologi...
Stan Gaj, Arie van Erk, Rachel I. M. van Haaften, ...
PAMI
2006
358views more  PAMI 2006»
13 years 9 months ago
Recovering 3D Human Pose from Monocular Images
We describe a learning based method for recovering 3D human body pose from single images and monocular image sequences. Our approach requires neither an explicit body model nor pri...
Ankur Agarwal, Bill Triggs
CORR
2004
Springer
103views Education» more  CORR 2004»
13 years 9 months ago
Online convex optimization in the bandit setting: gradient descent without a gradient
We study a general online convex optimization problem. We have a convex set S and an unknown sequence of cost functions c1, c2, . . . , and in each period, we choose a feasible po...
Abraham Flaxman, Adam Tauman Kalai, H. Brendan McM...
TKDE
2002
166views more  TKDE 2002»
13 years 8 months ago
A Comprehensive Analytical Performance Model for Disk Devices under Random Workloads
Our goal with this paper is to contribute a common theoretical framework for studying the performance of disk-storage devices. Understanding the performance behavior of these devi...
Peter Triantafillou, Stavros Christodoulakis, Cost...
FDTC
2010
Springer
132views Cryptology» more  FDTC 2010»
13 years 7 months ago
Fault Injection Resilience
Fault injections constitute a major threat to the security of embedded systems. The errors in the cryptographic algorithms have been shown to be extremely dangerous, since powerful...
Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger,...