Sciweavers

5122 search results - page 165 / 1025
» Comparing Consequence Relations
Sort
View
83
Voted
ICASSP
2010
IEEE
15 years 3 months ago
Sub-Nyquist processing with the modulated wideband converter
Sub-Nyquist systems capture the signal information in a different fashion than uniform high-rate samples. Consequently, digital processing, which is the prime reason for leaving t...
Moshe Mishali, Asaf Elron, Yonina C. Eldar
101
Voted
BIB
2007
53views more  BIB 2007»
15 years 3 months ago
Current Progress in computational metabolomics
Being a relatively new addition to the ‘omics’ field, metabolomics is still evolving its own computational infrastructure and assessing its own computational needs. Due to its...
David S. Wishart
121
Voted
CGF
2008
90views more  CGF 2008»
15 years 3 months ago
Visual Clustering in Parallel Coordinates
Parallel coordinates have been widely applied to visualize high-dimensional and multivariate data, discerning patterns within the data through visual clustering. However, the effe...
Hong Zhou, Xiaoru Yuan, Huamin Qu, Weiwei Cui, Bao...
150
Voted
CONSTRAINTS
2008
132views more  CONSTRAINTS 2008»
15 years 3 months ago
Essence : A constraint language for specifying combinatorial problems
Abstract. Essence is a formal language for specifying combinatorial problems, in a manner similar to natural rigorous specifications that use a mixture of natural language and disc...
Alan M. Frisch, Warwick Harvey, Christopher Jeffer...
CORR
2008
Springer
125views Education» more  CORR 2008»
15 years 3 months ago
Data Reduction in Intrusion Alert Correlation
: Network intrusion detection sensors are usually built around low level models of network traffic. This means that their output is of a similarly low level and as a consequence, ...
Gianni Tedesco, Uwe Aickelin