Sciweavers

7366 search results - page 1382 / 1474
» Development of the Information Systems Implementation Resear...
Sort
View
CC
2006
Springer
122views System Software» more  CC 2006»
15 years 7 months ago
Context-Sensitive Points-to Analysis: Is It Worth It?
We present the results of an empirical study evaluating the precision of subset-based points-to analysis with several variations of context sensitivity on Java benchmarks of signif...
Ondrej Lhoták, Laurie J. Hendren
ISMAR
2009
IEEE
15 years 10 months ago
Dynamic seethroughs: Synthesizing hidden views of moving objects
This paper presents a method to create an illusion of seeing moving objects through occluding surfaces in a video. This illusion is achieved by transferring information from a cam...
Peter Barnum, Yaser Sheikh, Ankur Datta, Takeo Kan...
IWDW
2007
Springer
15 years 10 months ago
Steganalysis Versus Splicing Detection
Aiming at detecting secret information hidden in a given image using steganographic tools, steganalysis has been of interest since the end of 1990’s. In particular, universal ste...
Yun Q. Shi, Chunhua Chen, Guorong Xuan, Wei Su
WCE
2007
15 years 5 months ago
High energy white beam x-ray diffraction studies of residual strains in engineering components
— In order to predict the durability of engineering components and improve performance, it is mandatory to understand residual stresses. The last decade has witnessed a significa...
Shu Yan Zhang, Willem J. J. Vorster, Tea-Sung Jun,...
BMCBI
2010
172views more  BMCBI 2010»
15 years 4 months ago
Comparison of evolutionary algorithms in gene regulatory network model inference
Background: The evolution of high throughput technologies that measure gene expression levels has created a data base for inferring GRNs (a process also known as reverse engineeri...
Alina Sîrbu, Heather J. Ruskin, Martin Crane
« Prev « First page 1382 / 1474 Last » Next »