Sciweavers

1717 search results - page 290 / 344
» Error concealment using a diffusion based method
Sort
View
CCR
2002
112views more  CCR 2002»
14 years 9 months ago
New directions in traffic measurement and accounting
Accurate network traffic measurement is required for accounting, bandwidth provisioning and detecting DoS attacks. These applications see the traffic as a collection of flows they...
Cristian Estan, George Varghese
BMCBI
2008
99views more  BMCBI 2008»
14 years 10 months ago
Ranking analysis of F-statistics for microarray data
Background: Microarray technology provides an efficient means for globally exploring physiological processes governed by the coordinated expression of multiple genes. However, ide...
Yuan-De Tan, Myriam Fornage, Hongyan Xu
ICCAD
2006
IEEE
112views Hardware» more  ICCAD 2006»
15 years 6 months ago
A new RLC buffer insertion algorithm
Most existing buffering algorithms neglect the impact of inductance on circuit performance, which causes large error in circuit analysis and optimization. Even for the approaches...
Zhanyuan Jiang, Shiyan Hu, Jiang Hu, Zhuo Li, Weip...
COCOA
2010
Springer
14 years 7 months ago
Bounds for Nonadaptive Group Tests to Estimate the Amount of Defectives
The classical and well-studied group testing problem is to find d defectives in a set of n elements by group tests, which tell us for any chosen subset whether it contains defectiv...
Peter Damaschke, Azam Sheikh Muhammad
NCA
2002
IEEE
14 years 9 months ago
Comparison of Algorithmic and Machine Learning Approaches for the Automatic Fitting of Gaussian Peaks
Fitting gaussian peaks to experimental data is important in many disciplines, including nuclear spectroscopy. Nonlinear least squares fitting methods have been in use for a long t...
Radwan E. Abdel-Aal