Sciweavers

2421 search results - page 242 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
BNCOD
2009
113views Database» more  BNCOD 2009»
15 years 5 months ago
Dimensions of Dataspaces
The vision of dataspaces has been articulated as providing various of the benefits of classical data integration, but with reduced upfront costs, combined with opportunities for in...
Cornelia Hedeler, Khalid Belhajjame, Alvaro A. A. ...
BMCBI
2005
93views more  BMCBI 2005»
15 years 4 months ago
Identification of novel prognostic markers in cervical intraepithelial neoplasia using LDMAS (LOH Data Management and Analysis S
Background: Detection of Loss of Heterozygosity (LOH) is one of the most common molecular applications in the study of human diseases, in particular cancer. The technique is commo...
Rifat A. Hamoudi, Amina El-Hamidi, Ming-Qing Du
TWC
2011
232views more  TWC 2011»
14 years 11 months ago
Joint Detection of Primary Systems Using UWB Impulse Radios
Abstract—Regulation in Europe and Japan requires the implementation of detect-and-avoid (DAA) techniques in some bands for the coexistence of licensed primary systems and seconda...
Serhat Erküçük, Lutz H.-J. Lampe,...
VIS
2004
IEEE
136views Visualization» more  VIS 2004»
16 years 5 months ago
Visibility Culling for Time-Varying Volume Rendering Using Temporal Occlusion Coherence
Typically there is a high coherence in data values between neighboring time steps in an iterative scientific software simulation; this characteristic similarly contributes to a co...
Jinzhu Gao, Han-Wei Shen, Jian Huang, James Arthur...
LPAR
2010
Springer
15 years 2 months ago
Synthesis of Trigger Properties
In automated synthesis, we transform a specification into a system that is guaranteed to satisfy the specification. In spite of the rich theory developed for temporal synthesis, l...
Orna Kupferman, Moshe Y. Vardi