Sciweavers

10797 search results - page 2051 / 2160
» Robust control applications
Sort
View
143
Voted
TRECVID
2007
15 years 4 months ago
Determination of Shot Boundary in MPEG Videos for TRECVID 2007
TURED ABSTRACT Detection of shot boundary plays important roles in many video applications. Herein, a novel method on shot boundary detection from compressed video is proposed. Fir...
Jinchang Ren, Jianmin Jiang, Juan Chen
128
Voted
BMCBI
2008
138views more  BMCBI 2008»
15 years 3 months ago
Systematic identification of yeast cell cycle transcription factors using multiple data sources
Background: Eukaryotic cell cycle is a complex process and is precisely regulated at many levels. Many genes specific to the cell cycle are regulated transcriptionally and are exp...
Wei-Sheng Wu, Wen-Hsiung Li
QSHINE
2009
IEEE
15 years 10 months ago
Integration of OMF-Based Testbeds in a Global-Scale Networking Facility
PlanetLab is a global scale platform for experimentation of new networking applications in a real environment. It consists of several nodes, offered by academic institutions or co...
Giovanni Di Stasi, Stefano Avallone, Roberto Canon...
FDTC
2009
Springer
189views Cryptology» more  FDTC 2009»
15 years 10 months ago
KeeLoq and Side-Channel Analysis-Evolution of an Attack
—Last year we were able to break KeeLoq, which is a 64 bit block cipher that is popular for remote keyless entry (RKE) systems. KeeLoq RKEs are widely used for access control pur...
Christof Paar, Thomas Eisenbarth, Markus Kasper, T...
MUC
1992
15 years 7 months ago
GE NLToolset: description of the system as used for MUC-4
The GE NLTooLsET is a set of text interpretation tools designed to be easily adapted to new domains. This report summarizes the system and its performance on the MUG-4 task . INTR...
George B. Krupka, Paul S. Jacobs, Lisa F. Rau, Loi...
« Prev « First page 2051 / 2160 Last » Next »