Sciweavers

1782 search results - page 331 / 357
» A Data Transformation Method Based on Schema Mapping
Sort
View
ASPDAC
2004
ACM
169views Hardware» more  ASPDAC 2004»
15 years 7 months ago
Design of real-time VGA 3-D image sensor using mixed-signal techniques
— We have developed the first real-time 3-D image sensor with VGA pixel resolution using mixed-signal techniques to achieve high-speed and high-accuracy range calculation based ...
Yusuke Oike, Makoto Ikeda, Kunihiro Asada
BMCBI
2010
118views more  BMCBI 2010»
15 years 2 months ago
Predicting nucleosome positioning using a duration Hidden Markov Model
Background: The nucleosome is the fundamental packing unit of DNAs in eukaryotic cells. Its detailed positioning on the genome is closely related to chromosome functions. Increasi...
Liqun Xi, Yvonne Fondufe-Mittendorf, Lei Xia, Jare...
CVPR
2012
IEEE
13 years 4 months ago
Spherical hashing
Many binary code encoding schemes based on hashing have been actively studied recently, since they can provide efficient similarity search, especially nearest neighbor search, an...
Jae-Pil Heo, Youngwoon Lee, Junfeng He, Shih-Fu Ch...
WACV
2008
IEEE
15 years 8 months ago
Robust Human Pose Recognition Using Unlabelled Markers
In this paper, we tackle robust human pose recognition using unlabelled markers obtained from an optical marker-based motion capture system. A coarse-to-fine fast pose matching al...
Yi Wang, Gang Qian
ACSAC
2006
IEEE
15 years 8 months ago
PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware
Modern malware often hide the malicious portion of their program code by making it appear as data at compiletime and transforming it back into executable code at runtime. This obf...
Paul Royal, Mitch Halpin, David Dagon, Robert Edmo...