Sciweavers

2421 search results - page 154 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
BMCBI
2006
134views more  BMCBI 2006»
15 years 1 months ago
An approach for clustering gene expression data with error information
Background: Clustering of gene expression patterns is a well-studied technique for elucidating trends across large numbers of transcripts and for identifying likely co-regulated g...
Brian Tjaden
ICIAP
1999
ACM
15 years 5 months ago
Random Walk Approach to Image Enhancement
The paper presents a new technique of image enhancement. The described algorithm enables the suppression of noise and contrast enhancement. The interesting feature of this new alg...
Bogdan Smolka, Konrad W. Wojciechowski, Marek Szcz...
92
Voted
FDL
2005
IEEE
15 years 6 months ago
SystemC-Based Communication and Performance Analysis
In today’s electronic system-level (ESL) design processes, an early analysis of a system’s communication and nce characteristics is becoming a key challenge. The availability ...
Axel G. Braun, Joachim Gerlach, Wolfgang Rosenstie...
TIT
2008
74views more  TIT 2008»
15 years 1 months ago
Rate Region of the Quadratic Gaussian Two-Encoder Source-Coding Problem
We determine the rate region of the quadratic Gaussian two-encoder source-coding problem. This rate region is achieved by a simple architecture that separates the analog and digita...
Aaron B. Wagner, Saurabha Tavildar, Pramod Viswana...
232
Voted
WACV
2012
IEEE
13 years 8 months ago
Predicting human gaze using quaternion DCT image signature saliency and face detection
We combine and extend the previous work on DCT-based image signatures and face detection to determine the visual saliency. To this end, we transfer the scalar definition of image...
Boris Schauerte, Rainer Stiefelhagen