Sciweavers

5544 search results - page 1085 / 1109
» Three Inadequate Models
Sort
View
ANOR
2005
102views more  ANOR 2005»
13 years 7 months ago
Locating Active Sensors on Traffic Networks
Sensors are used to monitor traffic in networks. For example, in transportation networks, they may be used to measure traffic volumes on given arcs and paths of the network. This p...
Monica Gentili, Pitu B. Mirchandani
ASE
2005
137views more  ASE 2005»
13 years 7 months ago
Rewriting-Based Techniques for Runtime Verification
Techniques for efficiently evaluating future time Linear Temporal Logic (abbreviated LTL) formulae on finite execution traces are presented. While the standard models of LTL are i...
Grigore Rosu, Klaus Havelund
IVC
2007
91views more  IVC 2007»
13 years 7 months ago
Evolutionary approach to inverse planning in coplanar radiotherapy
A unified evolutionary approach to coplanar radiotherapy inverse planning is proposed. It consists of a genetic algorithm-based framework that solves with little modification tr...
Vitoantonio Bevilacqua, Giuseppe Mastronardi, Gius...
TIP
2008
153views more  TIP 2008»
13 years 7 months ago
Hierarchical Color Correction for Camera Cell Phone Images
In this paper, we propose a hierarchical color correction algorithm for enhancing the color of digital images obtained from low quality digital image capture devices such as cell ...
Hasib Siddiqui, Charles A. Bouman
BMCBI
2005
104views more  BMCBI 2005»
13 years 7 months ago
Scoring functions for transcription factor binding site prediction
Background: Transcription factor binding site (TFBS) prediction is a difficult problem, which requires a good scoring function to discriminate between real binding sites and backg...
Markus T. Friberg, Peter von Rohr, Gaston H. Gonne...
« Prev « First page 1085 / 1109 Last » Next »