Sciweavers

1268 search results - page 96 / 254
» Direct Translation Model 2
Sort
View
139
Voted
BMCBI
2006
130views more  BMCBI 2006»
15 years 2 months ago
An accurate and interpretable model for siRNA efficacy prediction
Background: The use of exogenous small interfering RNAs (siRNAs) for gene silencing has quickly become a widespread molecular tool providing a powerful means for gene functional s...
Jean-Philippe Vert, Nicolas Foveau, Christian Laja...
108
Voted
ICCV
2003
IEEE
16 years 4 months ago
Gaze Manipulation for One-to-one Teleconferencing
A new algorithm is proposed for novel view generation in one-toone teleconferencing applications. Given the video streams acquired by two cameras placed on either side of a comput...
Antonio Criminisi, Jamie Shotton, Andrew Blake, Ph...
SRDS
1999
IEEE
15 years 6 months ago
Formal Hazard Analysis of Hybrid Systems in cTLA
Hybrid systems like computer-controlled chemical plants are typical safety critical distributed systems. In present practice, the safety of hybrid systems is guaranteed by hazard ...
Peter Herrmann, Heiko Krumm
140
Voted
ICC
2009
IEEE
190views Communications» more  ICC 2009»
15 years 9 months ago
Decomposition for Low-Complexity Near-Optimal Routing in Multi-Hop Wireless Networks
Abstract—Network flow models serve as a popular mathematical framework for the analysis and optimization of Multi-hop Wireless Networks. They also serve to provide the understan...
Vinay Kolar, Nael B. Abu-Ghazaleh, Petri Mäh&...
TIT
2011
125views more  TIT 2011»
14 years 9 months ago
Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption
Abstract. In 1998, Blaze, Bleumer, and Strauss proposed a cryptographic primitive called proxy re-encryption, in which a proxy transforms – without seeing the corresponding plain...
Benoît Libert, Damien Vergnaud