Sciweavers

1486 search results - page 161 / 298
» Firewall Rules Analysis
Sort
View
CAV
2012
Springer
236views Hardware» more  CAV 2012»
13 years 6 months ago
Lock Removal for Concurrent Trace Programs
Abstract. We propose a trace-based concurrent program analysis to soundly remove redundant synchronizations such as locks while preserving the behaviors of the concurrent computati...
Vineet Kahlon, Chao Wang
BMCBI
2010
240views more  BMCBI 2010»
15 years 4 months ago
TAM: A method for enrichment and depletion analysis of a microRNA category in a list of microRNAs
Background: MicroRNAs (miRNAs) are a class of important gene regulators. The number of identified miRNAs has been increasing dramatically in recent years. An emerging major challe...
Ming Lu, Bing Shi, Juan Wang, Qun Cao, Qinghua Cui
DNA
2006
Springer
146views Bioinformatics» more  DNA 2006»
15 years 8 months ago
On Times to Compute Shapes in 2D Tile Self-assembly
We study the times to grow structures within the tile self-assembly model proposed by Winfree, and the possible shapes that can be achieved. Our earlier work was confined to the g...
Yuliy M. Baryshnikov, Edward G. Coffman Jr., Boons...
ICIP
2005
IEEE
16 years 6 months ago
Nonlinear dimensionality reduction for classification using kernel weighted subspace method
We study the use of kernel subspace methods that learn low-dimensional subspace representations for classification tasks. In particular, we propose a new method called kernel weigh...
Guang Dai, Dit-Yan Yeung
ICDAR
2009
IEEE
15 years 11 months ago
Text Detection and Localization in Complex Scene Images using Constrained AdaBoost Algorithm
We have proposed a complete system for text detection and localization in gray scale scene images. A boosting framework integrating feature and weak classifier selection based on...
Shehzad Muhammad Hanif, Lionel Prevost