Sciweavers

2421 search results - page 251 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
VLDB
2004
ACM
143views Database» more  VLDB 2004»
15 years 10 months ago
GPX: Interactive Mining of Gene Expression Data
Discovering co-expressed genes and coherent expression patterns in gene expression data is an important data analysis task in bioinformatics research and biomedical applications. ...
Daxin Jiang, Jian Pei, Aidong Zhang
145
Voted
WSC
1997
15 years 6 months ago
Automating the Metamodeling Process
Model abstraction using metamodeling has demonstrated the capability to facilitate software reuse, large scale model integration, verification, and validation. Once restricted to...
Don Caughlin
IH
2001
Springer
15 years 9 months ago
Keyless Public Watermarking for Intellectual Property Authentication
Abstract. A constraint-based watermarking technique has been introduced for the protection of intellectual properties such as hardware, software, algorithms, and solutions to hard ...
Gang Qu
OPODIS
2004
15 years 6 months ago
Embedded Systems - Challenges and Work Directions
Embedded Systems are components integrating software and hardware jointly and specifically designed to provide given functionalities. These components may be used in many different...
Joseph Sifakis
CVPR
2005
IEEE
16 years 6 months ago
Accurate Motion Layer Segmentation and Matting
Given a video sequence, obtaining accurate layer segmentation and alpha matting is very important for various applications. However, when a non-textured or smooth area is present ...
Jiangjian Xiao, Mubarak Shah