Sciweavers

545 search results - page 16 / 109
» An algorithm for amplitude-constrained input design for syst...
Sort
View
GECCO
2010
Springer
173views Optimization» more  GECCO 2010»
13 years 7 months ago
Superstate identification for state machines using search-based clustering
State machines are a popular method of representing a syshigh level of abstraction that enables developers to gain an overview of the system they represent and quickly understand ...
Mathew Hall, Phil McMinn, Neil Walkinshaw
CODES
1996
IEEE
13 years 11 months ago
Partitioning and Exploration Strategies in the TOSCA Co-Design Flow
The TaSCA environment for hardware/software co-design of control dominated systems implemented on a single chip includes a novel approach to the system exploration phase for the e...
Alessandro Balboni, William Fornaciari, Donatella ...
SIGIR
2009
ACM
14 years 1 months ago
Protein identification as an information retrieval problem
We present the first interdisciplinary work on transforming a popular problem in proteomics, i.e. protein identification from tandem mass spectra, to an Information Retrieval (IR)...
Yiming Yang, Subramaniam Ganapathy, Abhay Harpale
ICPR
2006
IEEE
14 years 8 months ago
Fingerprint Image Enhancement Based on Skin Profile Approximation
The performance of the fingerprint identification and verification systems relies heavily on the quality of the input fingerprint images. In this paper, we propose an effective im...
Venu Govindaraju, Zhixin Shi
WWW
2005
ACM
14 years 8 months ago
Popular web hot spots identification and visualization
This work aims a two-fold contribution: it presents a software to analyse logfiles and visualize popular web hot spots and, additionally, presents an algorithm to use this informa...
D. Avramouli, John D. Garofalakis, Dimitris J. Kav...