Sciweavers

497 search results - page 95 / 100
» Privacy Enhanced Technologies: Methods - Markets - Misuse
Sort
View
BMCBI
2006
127views more  BMCBI 2006»
13 years 7 months ago
Using local gene expression similarities to discover regulatory binding site modules
Background: We present an approach designed to identify gene regulation patterns using sequence and expression data collected for Saccharomyces cerevisae. Our main goal is to rela...
Bartek Wilczynski, Torgeir R. Hvidsten, Andriy Kry...
JCIT
2008
165views more  JCIT 2008»
13 years 7 months ago
Adaptive Source pixel based Prediction for Lossless Intra Coding of H.264 MPEG-4 /AVC
A new prediction for lossless intra coding technique employs source pixel based prediction in contrast to source block based prediction is presented as an enhancement of H.264/MPE...
N. Krishnan, P. Vijayalakshmi, R. K. Selvakumar, S...
DAC
2006
ACM
14 years 8 months ago
Novel full-chip gridless routing considering double-via insertion
As the technology node advances into the nanometer era, via-open defects are one of the dominant failures. To improve via yield and reliability, redundant-via insertion is a highl...
Huang-Yu Chen, Mei-Fang Chiang, Yao-Wen Chang, Lum...
MICCAI
2006
Springer
14 years 8 months ago
A New CAD System for the Evaluation of Kidney Diseases Using DCE-MRI
Acute rejection is the most common reason of graft failure after kidney transplantation, and early detection is crucial to survive the transplanted kidney function. In this paper, ...
Ayman El-Baz, Rachid Fahmi, Seniha Esen Yuksel, Al...
ICSE
2003
IEEE-ACM
14 years 7 months ago
Patterns, Frameworks, and Middleware: Their Synergistic Relationships
The knowledge required to develop complex software has historically existed in programming folklore, the heads of experienced developers, or buried deep in the code. These locatio...
Douglas C. Schmidt, Frank Buschmann