Sciweavers

1548 search results - page 258 / 310
» Estimating Software Vulnerabilities
Sort
View
BMCBI
2007
99views more  BMCBI 2007»
15 years 3 months ago
Statistical significance of cis-regulatory modules
Background: It is becoming increasingly important for researchers to be able to scan through large genomic regions for transcription factor binding sites or clusters of binding si...
Dustin E. Schones, Andrew D. Smith, Michael Q. Zha...
BMCBI
2008
108views more  BMCBI 2008»
15 years 3 months ago
A nonparametric model for quality control of database search results in shotgun proteomics
Background: Analysis of complex samples with tandem mass spectrometry (MS/MS) has become routine in proteomic research. However, validation of database search results creates a bo...
Jiyang Zhang, Jianqi Li, Xin Liu, Hongwei Xie, Yun...
IJCV
2006
100views more  IJCV 2006»
15 years 3 months ago
A General Framework for Combining Visual Trackers - The "Black Boxes" Approach
Abstract. Over the past few years researchers have been investigating the enhancement of visual tracking performance by devising trackers that simultaneously make use of several di...
Ido Leichter, Michael Lindenbaum, Ehud Rivlin
TIFS
2008
148views more  TIFS 2008»
15 years 3 months ago
Digital Image Forensics via Intrinsic Fingerprints
Digital imaging has experienced tremendous growth in recent decades, and digital camera images have been used in a growing number of applications. With such increasing popularity a...
Ashwin Swaminathan, Min Wu, K. J. Ray Liu
VLSISP
2011
358views Database» more  VLSISP 2011»
14 years 10 months ago
Accelerating Machine-Learning Algorithms on FPGAs using Pattern-Based Decomposition
Machine-learning algorithms are employed in a wide variety of applications to extract useful information from data sets, and many are known to suffer from superlinear increases in ...
Karthik Nagarajan, Brian Holland, Alan D. George, ...