Sciweavers

2028 search results - page 260 / 406
» Deriving Relation Keys from XML Keys
Sort
View
BMCBI
2010
106views more  BMCBI 2010»
14 years 11 months ago
Identification and correction of previously unreported spatial phenomena using raw Illumina BeadArray data
Background: A key stage for all microarray analyses is the extraction of feature-intensities from an image. If this step goes wrong, then subsequent preprocessing and processing s...
Mike L. Smith, Mark J. Dunning, Simon Tavaré...
ICCV
2009
IEEE
1419views Computer Vision» more  ICCV 2009»
16 years 9 months ago
On Feature Combination for Multiclass Object Classification
A key ingredient in the design of visual object classification systems is the identification of relevant class specific aspects while being robust to intra-class variations. Whil...
Peter Gehler, Sebastian Nowozin
DRM
2007
Springer
15 years 11 months ago
Mechanism for software tamper resistance: an application of white-box cryptography
In software protection we typically have to deal with the white-box attack model. In this model an attacker is assumed to have full access to the software and full control over it...
Wil Michiels, Paul Gorissen
MICRO
2002
IEEE
171views Hardware» more  MICRO 2002»
15 years 9 months ago
Orion: a power-performance simulator for interconnection networks
With the prevalence of server blades and systems-ona-chip (SoCs), interconnection networks are becoming an important part of the microprocessor landscape. However, there is limite...
Hangsheng Wang, Xinping Zhu, Li-Shiuan Peh, Sharad...
RSCTC
1998
Springer
175views Fuzzy Logic» more  RSCTC 1998»
15 years 9 months ago
Business Process Understanding: Mining Many Datasets
Abstract. Institutional databases can be instrumental in understanding a business process, but additional data may broaden the empirical perspective on the investigated process. We...
Jan M. Zytkow, Arun P. Sanjeev