Sciweavers

7504 search results - page 1270 / 1501
» Computing with Action Potentials
Sort
View
IJNSEC
2007
161views more  IJNSEC 2007»
15 years 4 months ago
Data Hiding: Current Status and Key Issues
Image steganography is a covert communication method that uses an image as the cover to hide the truth from potential attackers that some secret message hidden in the image is bei...
Nan-I Wu, Min-Shiang Hwang
TEC
2008
100views more  TEC 2008»
15 years 4 months ago
Real-Valued Compact Genetic Algorithms for Embedded Microcontroller Optimization
Recent research on compact genetic algorithms (cGAs) has proposed a number of evolutionary search methods with reduced memory requirements. In cGAs, the evolution of populations is...
Ernesto Mininno, Francesco Cupertino, David Naso
TFS
2008
90views more  TFS 2008»
15 years 4 months ago
Fuzzy Interpolation and Extrapolation: A Practical Approach
Fuzzy interpolation does not only help to reduce the complexity of fuzzy models, but also makes inference in sparse rule-based systems possible. It has been successfully applied to...
Zhiheng Huang, Qiang Shen
TIP
2008
125views more  TIP 2008»
15 years 4 months ago
Segmentation by Fusion of Histogram-Based K-Means Clusters in Different Color Spaces
Abstract--This paper presents a new, simple, and efficient segmentation approach, based on a fusion procedure which aims at combining several segmentation maps associated to simple...
Max Mignotte
JBI
2007
127views Bioinformatics» more  JBI 2007»
15 years 4 months ago
Data integration and genomic medicine
Genomic medicine aims to revolutionize health care by applying our growing understanding of the molecular basis of disease. Research in this arena is data intensive, which means d...
Brenton Louie, Peter Mork, Fernando Martín-...
« Prev « First page 1270 / 1501 Last » Next »