Sciweavers

8655 search results - page 374 / 1731
» Challenges for Trusted Computing
Sort
View
124
Voted
IDA
2008
Springer
15 years 3 months ago
Estimating the depth of anesthesia using fuzzy soft computation applied to EEG features
Estimating the depth of anesthesia (DOA) is still a challenging area in anesthesia research. The objective of this study was to design a fuzzy rule based system which integrates el...
V. Esmaeili, Amin Assareh, M. B. Shamsollahi, Moha...
123
Voted
BMCBI
2007
96views more  BMCBI 2007»
15 years 3 months ago
Features generated for computational splice-site prediction correspond to functional elements
Background: Accurate selection of splice sites during the splicing of precursors to messenger RNA requires both relatively well-characterized signals at the splice sites and auxil...
Rezarta Islamaj Dogan, Lise Getoor, W. John Wilbur...
132
Voted
CN
2007
115views more  CN 2007»
15 years 3 months ago
Energy-aware QoS for application sessions across multiple protocol domains in mobile computing
The proliferation of heterogeneous devices and diverse networking technologies demands flexible models to guarantee the quality-of-service(QoS) at the application session level, ...
Hanping Lufei, Weisong Shi
133
Voted
NN
2006
Springer
15 years 3 months ago
Hold your horses: A dynamic computational role for the subthalamic nucleus in decision making
The basal ganglia (BG) coordinate decision making processes by facilitating adaptive frontal motor commands while suppressing others. In previous work, neural network simulations ...
Michael J. Frank
163
Voted
AES
2005
Springer
137views Cryptology» more  AES 2005»
15 years 3 months ago
Design of a multimedia processor based on metrics computation
Media-processing applications, such as signal processing, 2D and 3D graphics rendering, and image compression, are the dominant workloads in many embedded systems today. The real-...
Nader Ben Amor, Yannick Le Moullec, Jean-Philippe ...