Sciweavers

1812 search results - page 113 / 363
» Test Early, Test Often
Sort
View
BMCBI
2006
147views more  BMCBI 2006»
15 years 3 months ago
Grouping Gene Ontology terms to improve the assessment of gene set enrichment in microarray data
Background: Gene Ontology (GO) terms are often used to assess the results of microarray experiments. The most common way to do this is to perform Fisher's exact tests to find...
Alex Lewin, Ian C. Grieve
SCIA
2009
Springer
183views Image Analysis» more  SCIA 2009»
15 years 10 months ago
Globally Optimal Least Squares Solutions for Quasiconvex 1D Vision Problems
Abstract. Solutions to non-linear least squares problems play an essential role in structure and motion problems in computer vision. The predominant approach for solving these prob...
Carl Olsson, Martin Byröd, Fredrik Kahl
BROADNETS
2006
IEEE
15 years 10 months ago
XIOPerf: A Tool for Evaluating Network Protocols
— The nature of Grid and distributed computing implies communication between heterogeneous systems over a wide and ever-changing variety of network environments. Often large amou...
John Bresnahan, Rajkumar Kettimuthu, Ian T. Foster
ITC
1997
IEEE
80views Hardware» more  ITC 1997»
15 years 8 months ago
Scan Synthesis for One-Hot Signals
Tri-state buses and pass transistor logic are used in many complex applications to achieve high performance and small area. Such circuits often contain logic requiring one-hot sig...
Subhasish Mitra, LaNae J. Avra, Edward J. McCluske...
DIMVA
2010
15 years 5 months ago
Why Johnny Can't Pentest: An Analysis of Black-Box Web Vulnerability Scanners
Black-box web vulnerability scanners are a class of tools that can be used to identify security issues in web applications. These tools are often marketed as "point-and-click ...
Adam Doupé, Marco Cova, Giovanni Vigna