Sciweavers

3054 search results - page 571 / 611
» An fMRI Activation Method Using Complex Data
Sort
View
ENTCS
2007
121views more  ENTCS 2007»
15 years 2 months ago
Incremental Parametric Development of Greedy Algorithms
The event B method provides a general framework for modelling both data structures and algorithms. B models are validated by discharging proof obligations ensuring safety properti...
Dominique Cansell, Dominique Méry
TCS
2008
15 years 2 months ago
New constructions for provably-secure time-bound hierarchical key assignment schemes
A time-bound hierarchical key assignment scheme is a method to assign time-dependent encryption keys to a set of classes in a partially ordered hierarchy, in such a way that each ...
Alfredo De Santis, Anna Lisa Ferrara, Barbara Masu...
113
Voted
JACM
2002
94views more  JACM 2002»
15 years 2 months ago
The greedy path-merging algorithm for contig scaffolding
Given a collection of contigs and mate-pairs. The Contig Scaffolding Problem is to order and orientate the given contigs in a manner that is consistent with as many mate-pairs as p...
Daniel H. Huson, Knut Reinert, Eugene W. Myers
139
Voted
ICIP
2010
IEEE
14 years 12 months ago
Position dependent linear intra prediction for image coding
Intra prediction has been efficiently employed in block based image/video coding to remove the spatial redundancy. In this paper, we propose a position dependent linear intra pred...
Li Zhang, Siwei Ma, Wen Gao
148
Voted
STVR
2010
80views more  STVR 2010»
14 years 9 months ago
Testing coupling relationships in object-oriented programs
As we move to developing object-oriented programs, the complexity traditionally found in functions and procedures is moving to the connections among components. Different faults o...
Roger T. Alexander, Jeff Offutt, Andreas Stefik