Sciweavers

984 search results - page 129 / 197
» Combining and selecting characteristics of information use
Sort
View
IH
2001
Springer
15 years 4 months ago
Keyless Public Watermarking for Intellectual Property Authentication
Abstract. A constraint-based watermarking technique has been introduced for the protection of intellectual properties such as hardware, software, algorithms, and solutions to hard ...
Gang Qu
GCB
1998
Springer
78views Biometrics» more  GCB 1998»
15 years 4 months ago
Computational approaches to identify Leucine Zippers
The leucine zipper is a dimerization domain occurring mostly in regulatory and thus in many oncogenic proteins. The leucine repeat in the sequence has been traditionally used for ...
Erich Bornberg-Bauer
CTW
2004
84views more  CTW 2004»
14 years 11 months ago
Nurses' reactions to alarms in a neonatal intensive care unit
Neonatal intensive care units (NICUs), like other intensive care units, are intended to provide immediate responses to any change in the patient's condition. Patient-monitorin...
Yuval Bitan, Joachim Meyer, David Shinar, Ehud Zmo...
IEEECIT
2010
IEEE
14 years 10 months ago
Model-Level Debugging of Embedded Real-Time Systems
Abstract—Model-driven development has become the stateof-the-art approach for designing embedded real-time systems. heir high level of abstraction, models are easier to understan...
Wolfgang Haberl, Markus Herrmannsdoerfer, Jan Birk...
MIR
2010
ACM
167views Multimedia» more  MIR 2010»
15 years 6 months ago
Improving automatic music classification performance by extracting features from different types of data
This paper discusses two sets of automatic musical genre classification experiments. Promising research directions are then proposed based on the results of these experiments. The...
Cory McKay, Ichiro Fujinaga