Sciweavers

1016 search results - page 125 / 204
» Explore or Exploit
Sort
View
RECONFIG
2009
IEEE
182views VLSI» more  RECONFIG 2009»
14 years 3 months ago
Scalability Studies of the BLASTn Scan and Ungapped Extension Functions
BLASTn is a ubiquitous tool used for large scale DNA analysis. Detailed profiling tests reveal that the most computationally intensive sections of the BLASTn algorithm are the sc...
Siddhartha Datta, Ron Sass
ICEIS
2009
IEEE
14 years 3 months ago
Creation and Maintenance of Query Expansion Rules
In an information retrieval system, a thesaurus can be used for query expansion, i.e. adding words to queries in order to improve recall. We propose a semi-automatic and interactiv...
Stefania Castellani, Aaron N. Kaplan, Fréd&...
ATVA
2009
Springer
172views Hardware» more  ATVA 2009»
14 years 3 months ago
Symbolic CTL Model Checking of Asynchronous Systems Using Constrained Saturation
Abstract. The saturation state-space generation algorithm has demonstrated clear improvements over state-of-the-art symbolic methods for asynchronous systems. This work is motivate...
Yang Zhao, Gianfranco Ciardo
CIVR
2009
Springer
131views Image Analysis» more  CIVR 2009»
14 years 3 months ago
Supporting aspect-based video browsing: analysis of a user study
In this paper, we present a novel video search interface based on the concept of aspect browsing. The proposed strategy is to assist the user in exploratory video search by active...
Thierry Urruty, Frank Hopfgartner, David Hannah, D...
NOSSDAV
2009
Springer
14 years 3 months ago
Dynamic overlay multicast in 3D video collaborative systems
Multi-stream/multi-site 3D video collaborative systems are promising as they enable remote users to interact in a 3D virtual space with a sense of co-presence. However, the decent...
Wanmin Wu, Zhenyu Yang, Klara Nahrstedt