Sciweavers

1626 search results - page 147 / 326
» The method evaluation model: a theoretical model for validat...
Sort
View
CRYPTO
2000
Springer
134views Cryptology» more  CRYPTO 2000»
14 years 16 days ago
Taming the Adversary
Abstract. While there is a great deal of sophistication in modern cryptology, simple (and simplistic) explanations of cryptography remain useful and perhaps necessary. Many of the ...
Martín Abadi
ECCV
2000
Springer
14 years 10 months ago
Model-Based Initialisation for Segmentation
The initialisation of segmentation methods aiming at the localisation of biological structures in medical imagery is frequently regarded as a given precondition. In practice, howev...
Christian Brechbühler, Gábor Szé...
CANDC
2006
ACM
13 years 8 months ago
Predicting O-glycosylation sites in mammalian proteins by using SVMs
O-glycosylation is one of the most important, frequent and complex post-translational modifications. This modification can activate and affect protein functions. Here, we present ...
Sujun Li, Boshu Liu, Rong Zeng, Yu-Dong Cai, Yixue...
VLSID
2002
IEEE
138views VLSI» more  VLSID 2002»
14 years 8 months ago
ETAM++: Extended Transition Activity Measure for Low Power Address Bus Designs
Interconnection networks in Systems-On-Chip begin to have a non-negligible impact on the power consumption of a whole system. This is because of increasing inter-wire capacitances...
Haris Lekatsas, Jörg Henkel
DCOSS
2011
Springer
12 years 8 months ago
On sensor selection in linked information networks
—Sensor networks are often redundant by design; this is often done in order to achieve reliability in information processing. In many cases, the redundancy relationships between ...
Charu C. Aggarwal, Amotz Bar-Noy, Simon Shamoun