Sciweavers

180 search results - page 24 / 36
» A lightweight technique for assessing risks in requirements ...
Sort
View
KDD
2010
ACM
247views Data Mining» more  KDD 2010»
13 years 9 months ago
Metric forensics: a multi-level approach for mining volatile graphs
Advances in data collection and storage capacity have made it increasingly possible to collect highly volatile graph data for analysis. Existing graph analysis techniques are not ...
Keith Henderson, Tina Eliassi-Rad, Christos Falout...
BMCBI
2006
178views more  BMCBI 2006»
13 years 7 months ago
Correlation analysis of two-dimensional gel electrophoretic protein patterns and biological variables
Background: Two-dimensional gel electrophoresis (2DE) is a powerful technique to examine post-translational modifications of complexly modulated proteins. Currently, spot detectio...
Werner W. V. B. Van Belle, Nina N. A. Anensen, Ing...
IROS
2007
IEEE
136views Robotics» more  IROS 2007»
14 years 1 months ago
Using case-based reasoning for autonomous vehicle guidance
— Vehicle guidance in complex scenarios such as inner-city traffic requires an in-depth understanding of the current situation. In order to select the appropriate behavior for a...
Stefan Vacek, Tobias Gindele, Johann Marius Zö...
IJON
2002
98views more  IJON 2002»
13 years 7 months ago
Blind deconvolution by simple adaptive activation function neuron
The `Bussgang' algorithm is one among the most known blind deconvolution techniques in the adaptive signal processing literature. It relies on a Bayesian estimator of the sou...
Simone Fiori
IWDW
2005
Springer
14 years 26 days ago
A Survey of Watermarking Security
Digital watermarking studies have always been driven by the improvement of robustness. Most of articles of this field deal with this criterion, presenting more and more impressive...
Teddy Furon