Sciweavers

490 search results - page 97 / 98
» Image Authentication Based on Distributed Source Coding
Sort
View
CASES
2005
ACM
13 years 9 months ago
Exploiting pipelining to relax register-file port constraints of instruction-set extensions
Customisable embedded processors are becoming available on the market, thus making it possible for designers to speed up execution of applications by using Application-specific F...
Laura Pozzi, Paolo Ienne
ECIS
2000
13 years 8 months ago
Community Health Assessments: A Data Warehousing Approach
- The measurement and assessment of health status in communities throughout the world is a massive information technology challenge. The Comprehensive Assessment for Tracking Commu...
Donald J. Berndt, Alan R. Hevner, James Studnicki
BMCBI
2006
95views more  BMCBI 2006»
13 years 7 months ago
XcisClique: analysis of regulatory bicliques
Background: Modeling of cis-elements or regulatory motifs in promoter (upstream) regions of genes is a challenging computational problem. In this work, set of regulatory motifs si...
Amrita Pati, Cecilia Vasquez-Robinet, Lenwood S. H...
NAR
2008
191views more  NAR 2008»
13 years 7 months ago
The BioGRID Interaction Database: 2008 update
The Biological General Repository for Interaction Datasets (BioGRID) database (http://www. thebiogrid.org) was developed to house and distribute collections of protein and genetic...
Bobby-Joe Breitkreutz, Chris Stark, Teresa Reguly,...
BMCBI
2010
170views more  BMCBI 2010»
13 years 7 months ago
Analysis of lifestyle and metabolic predictors of visceral obesity with Bayesian Networks
Background: The aim of this study was to provide a framework for the analysis of visceral obesity and its determinants in women, where complex inter-relationships are observed amo...
Alex Aussem, André Tchernof, Sergio Rodrigu...