Sciweavers

88 search results - page 2 / 18
» The effects of time limitations on target identification
Sort
View
BMCBI
2007
139views more  BMCBI 2007»
13 years 7 months ago
XSTREAM: A practical algorithm for identification and architecture modeling of tandem repeats in protein sequences
Background: Biological sequence repeats arranged in tandem patterns are widespread in DNA and proteins. While many software tools have been designed to detect DNA tandem repeats (...
Aaron M. Newman, James B. Cooper
ISCAS
2005
IEEE
123views Hardware» more  ISCAS 2005»
14 years 1 months ago
Jitter limitations on multi-carrier modulation
—A feasibility study is made of an OFDM system based on analog multipliers and integrate-and-dump blocks, targeted at Gb/s copper interconnects. The effective amplitude variation...
Jan H. Rutger Schrader, Eric A. M. Klumperink, Jan...
SAINT
2003
IEEE
14 years 21 days ago
A Generalized Target-Driven Cache Replacement Policy for Mobile Environments
Caching frequently accessed data items on the client side is an effective technique to improve the system performance in wireless networks. Due to cache size limitations, cache re...
Liangzhong Yin, Guohong Cao, Ying Cai
ACISICIS
2005
IEEE
13 years 9 months ago
Palmprint Identification Algorithm Using Hu Invariant Moments and Otsu Binarization
Recently, Biometrics-based personal identification is regarded as an effective method of person's identity with recognition automation and high performance. In this paper, th...
Jin Soo Noh, Kang Hyeon Rhee
CEC
2009
IEEE
13 years 11 months ago
Automatic system identification based on coevolution of models and tests
In evolutionary robotics, controllers are often designed in simulation, then transferred onto the real system. Nevertheless, when no accurate model is available, controller transfe...
Sylvain Koos, Jean-Baptiste Mouret, Stéphan...