Sciweavers

13841 search results - page 2759 / 2769
» Algorithms and Constraint Programming
Sort
View
BMCBI
2005
98views more  BMCBI 2005»
14 years 9 months ago
InterferenceAnalyzer: Tools for the analysis and simulation of multi-locus genetic data
Background: Good statistical models for analyzing and simulating multilocus recombination data exist but are not accessible to many biologists because their use requires reasonabl...
Lalitha Viswanath, Elizabeth A. Housworth
TSE
2008
165views more  TSE 2008»
14 years 9 months ago
A Systematic Study of Failure Proximity
Software end users are the best testers, who keep revealing bugs in software that has undergone rigorous in-house testing. In order to leverage their testing efforts, failure repor...
Chao Liu 0001, Xiangyu Zhang, Jiawei Han
JNCA
2007
154views more  JNCA 2007»
14 years 9 months ago
Knowledge-based multimedia adaptation for ubiquitous multimedia consumption
Intelligent, server-side adaptation of multimedia resources is becoming increasingly important and challenging for two reasons. First, the market continuously brings up new mobile...
Dietmar Jannach, Klaus Leopold
79
Voted
JVCIR
2007
231views more  JVCIR 2007»
14 years 9 months ago
Painting in High Dynamic Range
We present a novel approach that allows users to intuitively and interactively manipulate High Dynamic Range (HDR) images using commonly available Low Dynamic Range (LDR) displays...
Mark Colbert, E. Reinhard, Charles E. Hughes
88
Voted
VLSISP
2008
173views more  VLSISP 2008»
14 years 9 months ago
Fast Bit Gather, Bit Scatter and Bit Permutation Instructions for Commodity Microprocessors
Advanced bit manipulation operations are not efficiently supported by commodity word-oriented microprocessors. Programming tricks are typically devised to shorten the long sequence...
Yedidya Hilewitz, Ruby B. Lee
« Prev « First page 2759 / 2769 Last » Next »