Sciweavers

3223 search results - page 638 / 645
» The Scaling of Search Cost
Sort
View
TC
2008
13 years 7 months ago
Cryptanalysis with COPACOBANA
Cryptanalysis of ciphers usually involves massive computations. The security parameters of cryptographic algorithms are commonly chosen so that attacks are infeasible with availabl...
Tim Güneysu, Timo Kasper, Martin Novotn&yacut...
BMCBI
2005
103views more  BMCBI 2005»
13 years 7 months ago
Many accurate small-discriminatory feature subsets exist in microarray transcript data: biomarker discovery
Background: Molecular profiling generates abundance measurements for thousands of gene transcripts in biological samples such as normal and tumor tissues (data points). Given such...
Leslie Grate
JLBS
2007
130views more  JLBS 2007»
13 years 7 months ago
Mobile positioning for traffic state acquisition
: The topics presented in this paper regard the project “Data Optimisation for integrated Telematics” (Do-iT) granted by the German ministry of economics and technology. Within...
Katrin Ramm, Volker Schwieger
ANOR
2004
170views more  ANOR 2004»
13 years 7 months ago
Graph Coloring for Air Traffic Flow Management
The aim of Air Traffic Flow Management (ATFM) is to enhance the capacity of the airspace while satisfying Air Traffic Control constraints and airlines requests to optimize their o...
Nicolas Barnier, Pascal Brisset
CCR
2004
93views more  CCR 2004»
13 years 7 months ago
Enabling large-scale wireless broadband: the case for TAPs
Abstract-- The vision is tantalizing: a high-performance, scalable, and widely deployed wireless Internet that facilitates services ranging from radically new and unforeseen applic...
Roger Karrer, Ashutosh Sabharwal, Edward W. Knight...