Sciweavers

672 search results - page 79 / 135
» An assessment of tag presentation techniques
Sort
View
ISSTA
1993
ACM
14 years 1 months ago
Mutation Analysis Using Mutant Schemata
Mutation analysis is a powerful technique for assessing and improving the quality of test data used to unit test software. Unfortunately, current automated mutation analysis syste...
Roland H. Untch, A. Jefferson Offutt, Mary Jean Ha...
BIRD
2007
Springer
118views Bioinformatics» more  BIRD 2007»
14 years 1 months ago
Biological Network Inference Using Redundancy Analysis
The paper presents MRNet, an original method for inferring genetic networks from microarray data. This method is based on maximum relevance/minimum redundancy (MRMR), an effective ...
Patrick Emmanuel Meyer, Kevin Kontos, Gianluca Bon...
BMVC
2000
13 years 10 months ago
Robust Facial Feature Tracking
We present a robust technique for tracking a set of pre-determined points on a human face. To achieve robustness, the Kanade-Lucas-Tomasi point tracker is extended and specialised...
Fabrice Bourel, Claude C. Chibelushi, Adrian A. Lo...
IJDMB
2008
117views more  IJDMB 2008»
13 years 9 months ago
Scoring and summarising gene product clusters using the Gene Ontology
: We propose an approach for quantifying the biological relatedness between gene products, based on their properties, and measure their similarities using exclusively statistical N...
Spiridon C. Denaxas, Christos Tjortjis
ISW
2010
Springer
13 years 7 months ago
Implicit Authentication through Learning User Behavior
Users are increasingly dependent on mobile devices. However, current authentication methods like password entry are significantly more frustrating and difficult to perform on these...
Elaine Shi, Yuan Niu, Markus Jakobsson, Richard Ch...