Sciweavers

2279 search results - page 261 / 456
» Robust Circle Detection
Sort
View
169
Voted
BMCBI
2011
14 years 8 months ago
Proportion statistics to detect differentially expressed genes: a comparison with log-ratio statistics
Background: In genetic transcription research, gene expression is typically reported in a test sample relative to a reference sample. Laboratory assays that measure gene expressio...
Tracy L. Bergemann, Jason Wilson
SIGSOFT
2003
ACM
16 years 5 months ago
ARCHER: using symbolic, path-sensitive analysis to detect memory access errors
Memory corruption errors lead to non-deterministic, elusive crashes. This paper describes ARCHER (ARray CHeckER) a static, effective memory access checker. ARCHER uses path-sensit...
Yichen Xie, Andy Chou, Dawson R. Engler
SERSCISA
2009
Springer
15 years 11 months ago
ATTENTION: ATTackEr Traceback Using MAC Layer AbNormality DetecTION
Denial-of-Service (DoS) and Distributed DoS (DDoS) attacks can cause serious problems in wireless networks due to limited network and host resources. Attacker traceback is a promi...
Yongjin Kim
VTC
2007
IEEE
149views Communications» more  VTC 2007»
15 years 11 months ago
An Iterative Detection Aided Irregular Convolutional Coded Wavelet Videophone Scheme Using Reversible Variable-Length Codes and
— In this paper, we characterize the achievable performance of a wavelet encoding-based videophone system, which further compresses and protects the wavelet-based video codec’s...
Anh Quang Pham, Jin Wang, Lie-Liang Yang, Lajos Ha...
VLDB
2007
ACM
137views Database» more  VLDB 2007»
15 years 10 months ago
Detecting Attribute Dependencies from Query Feedback
Real-world datasets exhibit a complex dependency structure among the data attributes. Learning this structure is a key task in automatic statistics configuration for query optimi...
Peter J. Haas, Fabian Hueske, Volker Markl