Sciweavers

6258 search results - page 1168 / 1252
» Applied Text Generation
Sort
View
119
Voted
ICASSP
2008
IEEE
15 years 10 months ago
An information theoretic approach to processing management
In region surveillance applications, sensors oftentimes accumulate an overwhelmingly large amount of data, making it infeasible to process all of the collected data in real-time. ...
Christopher M. Kreucher, Kevin M. Carter
146
Voted
ICDCS
2008
IEEE
15 years 10 months ago
PFC: Transparent Optimization of Existing Prefetching Strategies for Multi-Level Storage Systems
The multi-level storage architecture has been widely adopted in servers and data centers. However, while prefetching has been shown as a crucial technique to exploit the sequentia...
Zhe Zhang, Kyuhyung Lee, Xiaosong Ma, Yuanyuan Zho...
148
Voted
NDSS
2008
IEEE
15 years 10 months ago
Automatic Network Protocol Analysis
Protocol reverse engineering is the process of extracting application-level specifications for network protocols. Such specifications are very helpful in a number of security-re...
Gilbert Wondracek, Paolo Milani Comparetti, Christ...
117
Voted
BIBE
2007
IEEE
101views Bioinformatics» more  BIBE 2007»
15 years 10 months ago
A Robotic System for Real-time Tumor Manipulation During Image guided Breast Biopsy
Breast biopsy guided by imaging techniques such as ultrasound is widely used to evaluate suspicious masses within the breast. Currently, ultrasound imaging does not allow live guid...
Vishnu Mallapragada, Nilanjan Sarkar, Tarun Kanti ...
123
Voted
BIBM
2007
IEEE
132views Bioinformatics» more  BIBM 2007»
15 years 10 months ago
A Divide-and-Conquer Implementation of Three Sequence Alignment and Ancestor Inference
In this paper, we present an algorithm to simultaneously align three biological sequences with affine gap model and infer their common ancestral sequence. Our algorithm can be fu...
Feng Yue, Jijun Tang
« Prev « First page 1168 / 1252 Last » Next »