Sciweavers

960 search results - page 173 / 192
» There's no Data like More Data
Sort
View
PR
2008
218views more  PR 2008»
13 years 7 months ago
Automatic feature localisation with constrained local models
We present an efficient and robust method of locating a set of feature points in an object of interest. From a training set we construct a joint model of the appearance of each fe...
David Cristinacce, Timothy F. Cootes
BMCBI
2005
89views more  BMCBI 2005»
13 years 7 months ago
Comparative analysis of chromatin landscape in regulatory regions of human housekeeping and tissue specific genes
Background: Global regulatory mechanisms involving chromatin assembly and remodelling in the promoter regions of genes is implicated in eukaryotic transcription control especially...
Mythily Ganapathi, Pragya Srivastava, Sushanta Kum...
BMCBI
2004
119views more  BMCBI 2004»
13 years 7 months ago
Identification of polymorphic tandem repeats by direct comparison of genome sequence from different bacterial strains : a web-ba
Background: Polymorphic tandem repeat typing is a new generic technology which has been proved to be very efficient for bacterial pathogens such as B. anthracis, M. tuberculosis, ...
France Denoeud, Gilles Vergnaud
VLDB
2002
ACM
143views Database» more  VLDB 2002»
13 years 7 months ago
SQL Memory Management in Oracle9i
Complex database queries require the use of memory-intensive operators like sort and hashjoin. Those operators need memory, also referred to as SQL memory, to process their input ...
Benoît Dageville, Mohamed Zaït
ESEM
2010
ACM
13 years 6 months ago
Strengthening the empirical analysis of the relationship between Linus' Law and software security
Open source software is often considered to be secure because large developer communities can be leveraged to find and fix security vulnerabilities. Eric Raymond states Linus’ L...
Andrew Meneely, Laurie A. Williams