Sciweavers

1329 search results - page 102 / 266
» Phantom faces for face analysis
Sort
View
CIBB
2008
14 years 19 days ago
Curating a Large-Scale Regulatory Network by Evaluating Its Consistency with Expression Datasets
Abstract. The analysis of large-scale regulatory models using data issued from genome-scale high-throughput experimental techniques is an actual challenge in the systems biology fi...
Carito Guziolowski, Jeremy Gruel, Ovidiu Radulescu...
IFIP
2010
Springer
13 years 8 months ago
Supporting DSS Acceptability through a User-Centered Design Methodology: Experiences in Emergency Management
This paper presents a user-centered design methodology for Decision Support Systems (DSSs), which is specifically built to face the socio-technical gap that often impedes DSS accep...
Pietro Baroni, Daniela Fogli, Massimiliano Giacomi...
CC
2008
Springer
137views System Software» more  CC 2008»
14 years 19 days ago
On the Relative Completeness of Bytecode Analysis Versus Source Code Analysis
Abstract. We discuss the challenges faced by bytecode analyzers designed for code verification compared to similar analyzers for source code. While a bytecode-level analysis brings...
Francesco Logozzo, Manuel Fähndrich
MOBIHOC
2003
ACM
14 years 10 months ago
Worst-Case optimal and average-case efficient geometric ad-hoc routing
In this paper we present GOAFR, a new geometric ad-hoc routing algorithm combining greedy and face routing. We evaluate this algorithm by both rigorous analysis and comprehensive ...
Fabian Kuhn, Roger Wattenhofer, Aaron Zollinger
WIAMIS
2009
IEEE
14 years 5 months ago
High-presence, low-bandwidth, apparent 3D video-conferencing with a single camera
Small digital video cameras have become increasingly common, appearing on portable consumer devices such as cellular phones. The widespread use of video-conferencing, however, is ...
Timothy R. Brick, Jeffrey R. Spies, Barry-John The...