Sciweavers

110 search results - page 20 / 22
» A Method for Estimating Authentication Performance over Time...
Sort
View
USENIX
2008
13 years 9 months ago
LeakSurvivor: Towards Safely Tolerating Memory Leaks for Garbage-Collected Languages
Continuous memory leaks severely hurt program performance and software availability for garbage-collected programs. This paper presents a safe method, called LeakSurvivor, to tole...
Yan Tang, Qi Gao, Feng Qin
TMI
1998
137views more  TMI 1998»
13 years 7 months ago
Dynamic Imaging and Tracer Kinetic Modeling for Emission Tomography Using Rotating Detectors
— When performing dynamic studies using emission tomography the tracer distribution changes during acquisition of a single set of projections. This is particularly true for some ...
Chi-Hoi Lau, David Dagan Feng, Brian F. Hutton, Da...
WWW
2006
ACM
14 years 8 months ago
Optimizing scoring functions and indexes for proximity search in type-annotated corpora
We introduce a new, powerful class of text proximity queries: find an instance of a given "answer type" (person, place, distance) near "selector" tokens matchi...
Soumen Chakrabarti, Kriti Puniyani, Sujatha Das
BMCBI
2011
12 years 11 months ago
Gene set analysis for longitudinal gene expression data
Background: Gene set analysis (GSA) has become a successful tool to interpret gene expression profiles in terms of biological functions, molecular pathways, or genomic locations. ...
Ke Zhang, Haiyan Wang, Arne C. Bathke, Solomon W. ...
CVPR
2008
IEEE
14 years 9 months ago
Simultaneous image transformation and sparse representation recovery
Sparse representation in compressive sensing is gaining increasing attention due to its success in various applications. As we demonstrate in this paper, however, image sparse rep...
Junzhou Huang, Xiaolei Huang, Dimitris N. Metaxas