Sciweavers

1720 search results - page 182 / 344
» Evaluation of a High Performance Code Compression Method
Sort
View
149
Voted
BMCBI
2011
14 years 7 months ago
A Novel And Well-Defined Benchmarking Method For Second Generation Read Mapping
Background: Second generation sequencing technologies yield DNA sequence data at ultra high-throughput. Common to most biological applications is a mapping of the reads to an almo...
Manuel Holtgrewe, Anne-Katrin Emde, David Weese, K...
138
Voted
TVCG
2002
156views more  TVCG 2002»
15 years 3 months ago
A Hardware-Assisted Scalable Solution for Interactive Volume Rendering of Time-Varying Data
We present a scalable volume rendering technique that exploits lossy compression and low-cost commodity hardware to permit highly interactive exploration of time-varying scalar vol...
Eric B. Lum, Kwan-Liu Ma, John Clyne
117
Voted
ICDAR
2007
IEEE
15 years 7 months ago
Text-Independent Writer Identification and Verification on Offline Arabic Handwriting
In this paper, we evaluate the performance on Arabic handwriting of the text-independent writer identification methods that we developed and tested on Western script in recent yea...
Marius Bulacu, Lambert Schomaker, Axel Brink
150
Voted
ESANN
2003
15 years 5 months ago
Extraction of fuzzy rules from trained neural network using evolutionary algorithm
This paper presents our approach to the rule extraction problem from trained neural network. A method called REX is briefly described. REX acquires a set of fuzzy rules using an ev...
Urszula Markowska-Kaczmar, Wojciech Trelak
151
Voted
MICRO
1995
IEEE
125views Hardware» more  MICRO 1995»
15 years 7 months ago
Disjoint eager execution: an optimal form of speculative execution
Instruction Level Parallelism (ILP) speedups of an order-of-magnitude or greater may be possible using the techniques described herein. Traditional speculative code execution is t...
Augustus K. Uht, Vijay Sindagi, Kelley Hall