Sciweavers

3136 search results - page 590 / 628
» Comparison of Clique-Listing Algorithms
Sort
View
BMCBI
2006
153views more  BMCBI 2006»
14 years 12 months ago
Cancer diagnosis marker extraction for soft tissue sarcomas based on gene expression profiling data by using projective adaptive
Background: Recent advances in genome technologies have provided an excellent opportunity to determine the complete biological characteristics of neoplastic tissues, resulting in ...
Hiro Takahashi, Takeshi Nemoto, Teruhiko Yoshida, ...
BMCBI
2006
101views more  BMCBI 2006»
14 years 12 months ago
Predicting residue contacts using pragmatic correlated mutations method: reducing the false positives
Background: Predicting residues' contacts using primary amino acid sequence alone is an important task that can guide 3D structure modeling and can verify the quality of the ...
Petras J. Kundrotas, Emil Alexov
CORR
2006
Springer
96views Education» more  CORR 2006»
14 years 11 months ago
Upper Bounding the Performance of Arbitrary Finite LDPC Codes on Binary Erasure Channels
Assuming iterative decoding for binary erasure channels (BECs), a novel tree-based technique for upper bounding the bit error rates (BERs) of arbitrary, finite low-density parity-c...
Chih-Chun Wang, Sanjeev R. Kulkarni, H. Vincent Po...
CVIU
2006
171views more  CVIU 2006»
14 years 11 months ago
Free viewpoint action recognition using motion history volumes
Action recognition is an important and challenging topic in computer vision, with many important applications including video surveillance, automated cinematography and understand...
Daniel Weinland, Rémi Ronfard, Edmond Boyer
IJNSEC
2008
106views more  IJNSEC 2008»
14 years 11 months ago
Parallel Hardware Architectures for the Cryptographic Tate Pairing
Identity-based cryptography uses pairing functions,which are sophisticated bilinear maps defined on elliptic curves.Computing pairings efficiently in software is presently a relev...
Guido Marco Bertoni, Luca Breveglieri, Pasqualina ...