Sciweavers

2421 search results - page 386 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
BMCBI
2010
141views more  BMCBI 2010»
13 years 10 months ago
BioPhysConnectoR: Connecting Sequence Information and Biophysical Models
Background: One of the most challenging aspects of biomolecular systems is the understanding of the coevolution in and among the molecule(s). A complete, theoretical picture of th...
Franziska Hoffgaard, Philipp Weil, Kay Hamacher
VMV
2001
131views Visualization» more  VMV 2001»
13 years 11 months ago
Shape Model and Threshold Extraction via Shape Gradients
Shape information is utilized by numerous applications in computer vision, scientific visualization and computer graphics. This paper presents a novel algorithm for exploring and ...
Roger C. Tam, Alain Fournier
ECCV
2002
Springer
14 years 12 months ago
Eye Gaze Correction with Stereovision for Video-Teleconferencing
Abstract. The lack of eye contact in desktop video teleconferencing substantially reduces the effectiveness of video contents. While expensive and bulky hardware is available on th...
Ruigang Yang, Zhengyou Zhang
ECBS
2007
IEEE
155views Hardware» more  ECBS 2007»
14 years 2 months ago
Evaluating the Quality of Models Extracted from Embedded Real-Time Software
Due to the high cost of modeling, model-based techniques are yet to make their impact in the embedded systems industry, which still persist on maintaining code-oriented legacy sys...
Joel Huselius, Johan Kraft, Hans Hansson, Sasikuma...
ISSTA
2012
ACM
12 years 15 days ago
A quantitative study of accuracy in system call-based malware detection
Over the last decade, there has been a significant increase in the number and sophistication of malware-related attacks and infections. Many detection techniques have been propos...
Davide Canali, Andrea Lanzi, Davide Balzarotti, Ch...