Sciweavers

1466 search results - page 144 / 294
» Completeness of the Authentication Tests
Sort
View
CVPR
2012
IEEE
11 years 10 months ago
Icon scanning: Towards next generation QR codes
Undoubtedly, a key feature in the popularity of smartmobile devices is the numerous applications one can install. Frequently, we learn about an application we desire by seeing it ...
Itamar Friedman, Lihi Zelnik-Manor
ICCS
2004
Springer
14 years 1 months ago
A Framework for Online Inversion-Based 3D Site Characterization
Our goal is to develop the capability for characterizing the three-dimensional geological structure and mechanical properties of individual sites and complete basins in earthquake-...
Volkan Akcelik, Jacobo Bielak, George Biros, Ioann...
BMCBI
2010
116views more  BMCBI 2010»
13 years 8 months ago
permGPU: Using graphics processing units in RNA microarray association studies
Background: Many analyses of microarray association studies involve permutation, bootstrap resampling and crossvalidation, that are ideally formulated as embarrassingly parallel c...
Ivo D. Shterev, Sin-Ho Jung, Stephen L. George, Ko...
IJVR
2008
106views more  IJVR 2008»
13 years 8 months ago
Improved View Frustum Culling Technique for Real-Time Virtual Heritage Application
Real-time virtual heritage application is normally executed with a high performance computer system. This is due to the complexity and highly computational cost which makes such sy...
Mohd Shahrizal Sunar, Abdullah Mohd Zin, Tengku M....
BMCBI
2005
98views more  BMCBI 2005»
13 years 8 months ago
The effects of normalization on the correlation structure of microarray data
Background: Stochastic dependence between gene expression levels in microarray data is of critical importance for the methods of statistical inference that resort to pooling test-...
Xing Qiu, Andrew I. Brooks, Lev Klebanov, Andrei Y...