Sciweavers

107 search results - page 2 / 22
» Controlling Redundancy in Referring Expressions
Sort
View
IEEEPACT
2008
IEEE
14 years 20 days ago
Redundancy elimination revisited
This work proposes and evaluates improvements to previously known algorithms for redundancy elimination. Enhanced Scalar Replacement combines two classic techniques, scalar replac...
Keith D. Cooper, Jason Eckhardt, Ken Kennedy
BMCBI
2006
119views more  BMCBI 2006»
13 years 6 months ago
Utilization of two sample t-test statistics from redundant probe sets to evaluate different probe set algorithms in GeneChip stu
Background: The choice of probe set algorithms for expression summary in a GeneChip study has a great impact on subsequent gene expression data analysis. Spiked-in cRNAs with know...
Zihua Hu, Gail R. Willsky
CCS
2009
ACM
14 years 6 months ago
Efficient IRM enforcement of history-based access control policies
Inlined Reference Monitor (IRM) is an established enforcement mechanism for history-based access control policies. IRM enforcement injects monitoring code into the binary of an un...
Fei Yan, Philip W. L. Fong
PAMI
2011
13 years 1 months ago
3D Face Reconstruction from a Single Image Using a Single Reference Face Shape
—Human faces are remarkably similar in global properties, including size, aspect ratio, and location of main features, but can vary considerably in details across individuals, ge...
Ira Kemelmacher-Shlizerman, Ronen Basri
WIKIS
2010
ACM
13 years 10 months ago
Deep hypertext with embedded revision control implemented in regular expressions
While text versioning was definitely a part of the original hypertext concept [21, 36, 44], it is rarely considered in this context today. Still, we know that revision control un...
Victor S. Grishchenko