Sciweavers

1562 search results - page 253 / 313
» Learning a Scanning Understanding for
Sort
View
97
Voted
CSB
2004
IEEE
15 years 7 months ago
Navigating through the Biological Maze
Advances in genome science have created a surge of data. These data critical to scientific discovery are made available in thousands of heterogeneous public resources. Each of the...
Zoé Lacroix, Kaushal Parekh, Louiqa Raschid...
129
Voted
FGR
2004
IEEE
149views Biometrics» more  FGR 2004»
15 years 7 months ago
Authentic Facial Expression Analysis
It is argued that for the computer to be able to interact with humans, it needs to have the communication skills of humans. One of these skills is the ability to understand the em...
Nicu Sebe, Michael S. Lew, Ira Cohen, Yafei Sun, T...
153
Voted
EMSOFT
2006
Springer
15 years 7 months ago
Defining a strategy to introduce a software product line using existing embedded systems
Engine Control Systems (ECS) for automobiles have numerous variants for many manufactures and different markets. To improve development efficiency, exploiting ECS commonalities an...
Kentaro Yoshimura, Dharmalingam Ganesan, Dirk Muth...
GECCO
2006
Springer
161views Optimization» more  GECCO 2006»
15 years 7 months ago
Innovization: innovating design principles through optimization
This paper introduces a new design methodology (we call it "innovization") in the context of finding new and innovative design principles by means of optimization techni...
Kalyanmoy Deb, Aravind Srinivasan
132
Voted
ICSE
1995
IEEE-ACM
15 years 7 months ago
Reverse Engineering of Legacy Code Exposed
— Reverse engineering of large legacy software systems generally cannot meet its objectives because it cannot be cost-effective. There are two main reasons for this. First, it is...
Bruce W. Weide, Wayne D. Heym, Joseph E. Hollingsw...