Sciweavers

476 search results - page 30 / 96
» Analysis of signature change patterns
Sort
View
ICDAR
2003
IEEE
14 years 3 months ago
Word Searching in CCITT Group 4 Compressed Document Images
In this paper, we present a compressed pattern matching method for searching user queried words in the CCITT Group 4 compressed document images, without decompressing. The feature...
Yue Lu, Chew Lim Tan
DMIN
2006
141views Data Mining» more  DMIN 2006»
13 years 11 months ago
Extracting Forensic Explanation from Intrusion Alerts
Since it is desirable for an intrusion detection system to be operated with the real time performance, it is not unusual for an intrusion detection engine to perform a "lazy ...
Bon Sy, Negmat Mullodzhanov
BMCBI
2010
124views more  BMCBI 2010»
13 years 10 months ago
Comparative analysis of acute and chronic corticosteroid pharmacogenomic effects in rat liver: Transcriptional dynamics and regu
Background: Comprehensively understanding corticosteroid pharmacogenomic effects is an essential step towards an insight into the underlying molecular mechanisms for both benefici...
Tung T. Nguyen, Richard R. Almon, Debra C. DuBois,...
IWPSE
2003
IEEE
14 years 3 months ago
CVS Release History Data for Detecting Logical Couplings
The dependencies and interrelations between classes and modules affect the maintainability of object-oriented systems. It is therefore important to capture weaknesses of the softw...
Harald Gall, Mehdi Jazayeri, Jacek Krajewski
ECBS
2007
IEEE
144views Hardware» more  ECBS 2007»
14 years 4 months ago
DP-Miner: Design Pattern Discovery Using Matrix
Design patterns document expert design experience in software system development. They have been applied in many existing software systems. However, pattern information is general...
Jing Dong, Dushyant S. Lad, Yajing Zhao