Sciweavers

2168 search results - page 114 / 434
» Using Approximation Hardness to Achieve Dependable Computati...
Sort
View
SOSP
2003
ACM
16 years 22 days ago
Terra: a virtual machine-based platform for trusted computing
We present a flexible architecture for trusted computing, called Terra, that allows applications with a wide range of security requirements to run simultaneously on commodity har...
Tal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenbl...
MOBIHOC
2007
ACM
16 years 3 months ago
Bounds for the capacity of wireless multihop networks imposed by topology and demand
Existing work on the capacity of wireless networks predominantly considers homogeneous random networks with random work load. The most relevant bounds on the network capacity, e.g...
Alireza Keshavarz-Haddad, Rudolf H. Riedi
CIVR
2010
Springer
427views Image Analysis» more  CIVR 2010»
15 years 7 months ago
An efficient method for face retrieval from large video datasets
The human face is one of the most important objects in videos since it provides rich information for spotting certain people of interest, such as government leaders in news video,...
Thao Ngoc Nguyen, Thanh Duc Ngo, Duy-Dinh Le, Shin...
RECOMB
2003
Springer
16 years 4 months ago
Maximum entropy modeling of short sequence motifs with applications to RNA splicing signals
We propose a framework for modeling sequence motifs based on the maximum entropy principle (MEP). We recommend approximating short sequence motif distributions with the maximum en...
Gene W. Yeo, Christopher B. Burge
BMCBI
2008
132views more  BMCBI 2008»
15 years 4 months ago
Computational cluster validation for microarray data analysis: experimental assessment of Clest, Consensus Clustering, Figure of
Background: Inferring cluster structure in microarray datasets is a fundamental task for the so-called -omic sciences. It is also a fundamental question in Statistics, Data Analys...
Raffaele Giancarlo, Davide Scaturro, Filippo Utro