Sciweavers

984 search results - page 85 / 197
» ideas 2010
Sort
View
JCNS
2010
90views more  JCNS 2010»
14 years 11 months ago
Fast Kalman filtering on quasilinear dendritic trees
Optimal filtering of noisy voltage signals on dendritic trees is a key problem in computational cellular neuroscience. However, the state variable in this problem -- the vector of...
Liam Paninski
131
Voted
JDCTA
2010
148views more  JDCTA 2010»
14 years 11 months ago
Design and Implementation of a Novel General-purpose Enterprise Application Business Infrastructure Software Platform
Platform-based development is currently the dominant development method of enterprise application, but the features provided by current mainstream enterprise application developme...
Yao Rong, Jiandong Wang
JDCTA
2010
175views more  JDCTA 2010»
14 years 11 months ago
Evolution Cipher against Differential Power Attack
: Differntial Power Attack (DPA) is one kind of Side Channel Attacks (SCAs). There are two phases in DPA attacks: sample collection and statistical analysis, which can be utilized ...
Shubo Liu, Ming Tang, Si Gao, Huanguo Zhang
JDCTA
2010
228views more  JDCTA 2010»
14 years 11 months ago
Research and Progress of Cluster Algorithms based on Granular Computing
Granular Computing (GrC), a knowledge-oriented computing which covers the theory of fuzzy information granularity, rough set theory, the theory of quotient space and interval comp...
Shifei Ding, Li Xu, Hong Zhu, Liwen Zhang
JMLR
2010
102views more  JMLR 2010»
14 years 11 months ago
Efficient Algorithms for Conditional Independence Inference
The topic of the paper is computer testing of (probabilistic) conditional independence (CI) implications by an algebraic method of structural imsets. The basic idea is to transfor...
Remco R. Bouckaert, Raymond Hemmecke, Silvia Lindn...