Sciweavers

5777 search results - page 1150 / 1156
» The palladio component model
Sort
View
JPDC
2008
138views more  JPDC 2008»
13 years 8 months ago
Efficient parallel implementation of iterative reconstruction algorithms for electron tomography
Electron tomography (ET) combines electron microscopy and the principles of tomographic imaging in order to reconstruct the threedimensional structure of complex biological specim...
José-Jesús Fernández, Dan Gor...
JCP
2006
157views more  JCP 2006»
13 years 8 months ago
CF-GeNe: Fuzzy Framework for Robust Gene Regulatory Network Inference
Most Gene Regulatory Network (GRN) studies ignore the impact of the noisy nature of gene expression data despite its significant influence upon inferred results. This paper present...
Muhammad Shoaib B. Sehgal, Iqbal Gondal, Laurence ...
NN
2008
Springer
150views Neural Networks» more  NN 2008»
13 years 8 months ago
Neural network based pattern matching and spike detection tools and services - in the CARMEN neuroinformatics project
In the study of information flow in the nervous system, component processes can be investigated using a range of electrophysiological and imaging techniques. Although data is diff...
Martyn Fletcher, Bojian Liang, Leslie Smith, Alast...
IAJIT
2007
90views more  IAJIT 2007»
13 years 8 months ago
Software Reuse for Mobile Robot Applications Through Analysis Patterns
: Software analysis pattern is an approach of software reuse which provides a way to reuse expertise that can be used across domains at early level of development. Developing softw...
Dayang N. A. Jawawi, Safaai Deris, Rosbi Mamat
IEEESP
2007
98views more  IEEESP 2007»
13 years 8 months ago
Educating Students to Create Trustworthy Systems
igh level of abstraction and to provide broad oversight. In contrast, the goal of computer science security education is to provide the technicalexpertisetodevelopsecure software a...
Richard S. Swart, Robert F. Erbacher
« Prev « First page 1150 / 1156 Last » Next »