Sciweavers

445 search results - page 48 / 89
» Recco: recombination analysis using cost optimization
Sort
View
BWCCA
2010
14 years 5 months ago
Lifetime Security Improvement in Wireless Sensor Network Using Queue-Based Techniques
A wireless sensor network (WSN) is envisioned as a cluster of tiny power-constrained devices with functions of sensing and communications. Sensors closer to a sink node have a larg...
Fuu-Cheng Jiang, Hsiang-Wei Wu, Der-Chen Huang, Ch...
DAC
1997
ACM
15 years 2 months ago
Analysis and Evaluation of Address Arithmetic Capabilities in Custom DSP Architectures
—Many application-specific architectures provide indirect addressing modes with auto-increment/decrement arithmetic. Since these architectures generally do not feature an indexe...
Ashok Sudarsanam, Stan Y. Liao, Srinivas Devadas
ICLP
1997
Springer
15 years 2 months ago
Non-Failure Analysis for Logic Programs
We provide a method whereby, given mode and (upper approximation) type information, we can detect procedures and goals that can be guaranteed to not fail (i.e., to produce at leas...
Saumya K. Debray, Pedro López-García...
DELOS
2000
14 years 11 months ago
Analysis of the Effectiveness-Efficiency Dependence for Image Retrieval
Similarity search in image database is commonly implemented as nearest-neighbor search in a feature space of the images. For that purpose, a large number of different features as ...
Martin Heczko, Daniel A. Keim, Roger Weber
BIBE
2007
IEEE
127views Bioinformatics» more  BIBE 2007»
15 years 4 months ago
A Heuristic for Phylogenetic Reconstruction Using Transposition
Abstract—Because of the advent of high-throughput sequencing and the consequent reduction in cost of sequencing, many organisms have been completely sequenced and most of their g...
Feng Yue, Meng Zhang, Jijun Tang