Sciweavers

421 search results - page 43 / 85
» A divide-and-merge methodology for clustering
Sort
View
ESANN
2008
14 years 11 months ago
Discrimination of regulatory DNA by SVM on the basis of over- and under-represented motifs
In this paper we apply three pattern recognition methods (support vector machine, cluster analysis and principal component analysis) to distinguish regulatory regions from coding a...
Rene te Boekhorst, Irina I. Abnizova, Lorenz Werni...
VIS
2004
IEEE
166views Visualization» more  VIS 2004»
15 years 11 months ago
Centroidal Voronoi Tessellation Based Algorithms for Vector Fields Visualization and Segmentation
A new method for the simplification and the visualization of vector fields is presented based on the notion of Centroidal Voronoi tessellations (CVT's). A CVT is a special Vo...
Qiang Du, Xiaoqiang Wang
ICCAD
2001
IEEE
185views Hardware» more  ICCAD 2001»
15 years 7 months ago
Application-Driven Processor Design Exploration for Power-Performance Trade-off Analysis
1 - This paper presents an efficient design exploration environment for high-end core processors. The heart of the proposed design exploration framework is a two-level simulation e...
Diana Marculescu, Anoop Iyer
IH
2001
Springer
15 years 2 months ago
Computational Forensic Techniques for Intellectual Property Protection
Computational forensic engineering (CFE) aims to identify the entity that created a particular intellectual property (IP). Rather than relying on watermarking content or designs, t...
Jennifer L. Wong, Darko Kirovski, Miodrag Potkonja...
ISORC
1998
IEEE
15 years 2 months ago
The Time-Triggered Architecture
The Time-Triggered Architecture (TTA) provides a computing infrastructure for the design and implementation of dependable distributed embedded systems. A large real-time applicatio...
Hermann Kopetz