Sciweavers

1720 search results - page 163 / 344
» Evaluation of a High Performance Code Compression Method
Sort
View
BMCBI
2010
108views more  BMCBI 2010»
14 years 11 months ago
Preferred analysis methods for Affymetrix GeneChips. II. An expanded, balanced, wholly-defined spike-in dataset
Background: Concomitant with the rise in the popularity of DNA microarrays has been a surge of proposed methods for the analysis of microarray data. Fully controlled "spike-i...
Qianqian Zhu, Jeffrey C. Miecznikowski, Marc S. Ha...
AAAI
2008
15 years 6 months ago
Learning to Analyze Binary Computer Code
We present a novel application of structured classification: identifying function entry points (FEPs, the starting byte of each function) in program binaries. Such identification ...
Nathan E. Rosenblum, Xiaojin Zhu, Barton P. Miller...
154
Voted
SIGSOFT
2005
ACM
15 years 9 months ago
PR-Miner: automatically extracting implicit programming rules and detecting violations in large software code
Programs usually follow many implicit programming rules, most of which are too tedious to be documented by programmers. When these rules are violated by programmers who are unawar...
Zhenmin Li, Yuanyuan Zhou
MM
2004
ACM
147views Multimedia» more  MM 2004»
15 years 9 months ago
Implementation and evaluation of EXT3NS multimedia file system
The EXT3NS is a scalable file system designed to handle video streaming workload in large-scale on-demand streaming services. It is based on a special H/W device, called Network-S...
Baik-Song Ahn, Sung-Hoon Sohn, Chei-Yol Kim, Gyu-I...
126
Voted
ICIP
2002
IEEE
16 years 5 months ago
Likelihood normalization for face authentication in variable recording conditions
In this paper we evaluate the effectiveness of two likelihood normalization techniques, the Background Model Set (BMS) and the Universal Background Model (UBM), for improving perf...
Kuldip K. Paliwal, Conrad Sanderson