Sciweavers

2229 search results - page 289 / 446
» Comparative analysis of biclustering algorithms
Sort
View
DSD
2010
IEEE
161views Hardware» more  DSD 2010»
13 years 10 months ago
Design of Trace-Based Split Array Caches for Embedded Applications
—Since many embedded systems execute a predefined set of programs, tuning system components to application programs and data is the approach chosen by many design techniques to o...
Alice M. Tokarnia, Marina Tachibana
CMPB
2010
141views more  CMPB 2010»
13 years 10 months ago
Real-time segmentation by Active Geometric Functions
Recent advances in 4D imaging and real-time imaging provide image data with clinically important cardiac dynamic information at high spatial or temporal resolution. However, the en...
Qi Duan, Elsa D. Angelini, Andrew F. Laine
JUCS
2008
160views more  JUCS 2008»
13 years 10 months ago
Automatic Construction of Fuzzy Rule Bases: a further Investigation into two Alternative Inductive Approaches
: The definition of the Fuzzy Rule Base is one of the most important and difficult tasks when designing Fuzzy Systems. This paper discusses the results of two different hybrid meth...
Marcos Evandro Cintra, Heloisa de Arruda Camargo, ...
CAD
2004
Springer
13 years 10 months ago
Isotopic approximations and interval solids
Given a nonsingular compact two-manifold F without boundary, we present methods for establishing a family of surfaces which can approximate F so that each approximant is ambient i...
Takis Sakkalis, Thomas J. Peters, Justin Bisceglio
ICIP
2010
IEEE
13 years 8 months ago
Detecting multiple copies in tampered images
Copy-move forgeries are parts of the image that are duplicated elsewhere into the same image, often after being modified by geometrical transformations. In this paper we present a...
Edoardo Ardizzone, Alessandro Bruno, Giuseppe Mazz...