Sciweavers

7117 search results - page 52 / 1424
» IT Governance Frameworks as Methods
Sort
View
SIGADA
2005
Springer
15 years 4 months ago
The affordable application of formal methods to software engineering
The purpose of this research paper is to examine (1) why formal methods are required for software systems today; (2) the Praxis High Integrity Systems’ Correctness-by-Constructi...
James F. Davis
BMCBI
2010
152views more  BMCBI 2010»
14 years 11 months ago
Comparative study of three commonly used continuous deterministic methods for modeling gene regulation networks
Background: A gene-regulatory network (GRN) refers to DNA segments that interact through their RNA and protein products and thereby govern the rates at which genes are transcribed...
Martin T. Swain, Johannes J. Mandel, Werner Dubitz...
SC
1995
ACM
15 years 2 months ago
Parallel Matrix-Vector Product Using Approximate Hierarchical Methods
Matrix-vector products (mat-vecs) form the core of iterative methods used for solving dense linear systems. Often, these systems arise in the solution of integral equations used i...
Ananth Grama, Vipin Kumar, Ahmed H. Sameh
MTA
2006
283views more  MTA 2006»
14 years 11 months ago
An evaluation of image based steganography methods
- Steganography is a process that involves hiding a message in an appropriate carrier for example an image or an audio file. The carrier can then be sent to a receiver without anyo...
Karen Bailey, Kevin Curran
CIVR
2010
Springer
427views Image Analysis» more  CIVR 2010»
15 years 2 months ago
An efficient method for face retrieval from large video datasets
The human face is one of the most important objects in videos since it provides rich information for spotting certain people of interest, such as government leaders in news video,...
Thao Ngoc Nguyen, Thanh Duc Ngo, Duy-Dinh Le, Shin...