Results 1 - 10
of
2,551
The translation sensitivity of wavelet-based registration
- IEEE Trans. Pattern Anal. Mach. Intelligence
, 1999
"... AbstractÐThis paper studies the effects of image translation on wavelet-based image registration. The main result is that the normalized correlation coefficients of low-pass Haar and Daubechies wavelet subbands are essentially insensitive to translations for features larger than twice the wavelet bl ..."
Abstract
-
Cited by 7 (0 self)
- Add to MetaCart
blocksize. The third-level low-pass subbands produce a correlation peak that varies with translation from 0.7 and 1.0 with an average in excess of 0.9. Translation sensitivity is limited to the high-pass subband and even this subband is potentially useful. The correlation peak for high-pass subbands derived
Cloning-based context-sensitive pointer alias analysis using binary decision diagrams
- In Proceedings of the ACM SIGPLAN 2004 Conference on Programming Language Design and Implementation
, 2004
"... This paper presents the first scalable context-sensitive, inclusionbased pointer alias analysis for Java programs. Our approach to context sensitivity is to create a clone of a method for every context of interest, and run a context-insensitive algorithm over the expanded call graph to get context-s ..."
Abstract
-
Cited by 311 (16 self)
- Add to MetaCart
that automatically translates Datalog programs into highly efficient BDD implementations. We used this approach to develop a variety of context-sensitive algorithms including side effect analysis, type analysis, and escape analysis.
Translational sensitivity of the Escherichia coli genome to fluctuating tRNA availability
- Nucleic Acids Res
, 2013
"... The synthesis of protein from messenger RNA during translation is a highly dynamic process that plays a key role in controlling the efficiency and fidelity of genome-wide protein expression. The availability of aminoacylated transfer RNA (tRNA) is a major factor influencing the speed of ribosomal mo ..."
Abstract
-
Cited by 2 (2 self)
- Add to MetaCart
The synthesis of protein from messenger RNA during translation is a highly dynamic process that plays a key role in controlling the efficiency and fidelity of genome-wide protein expression. The availability of aminoacylated transfer RNA (tRNA) is a major factor influencing the speed of ribosomal
Identification of protein coding regions by database similarity search
- Nature Genetics
, 1993
"... Correspondence should be addressed to W.G. page 1 Summary Sequence similarity between a translated nucleotide sequence and a known biological protein can provide strong evidence for the presence of a homologous coding region, and such similarities can often be identified even between distantly relat ..."
Abstract
-
Cited by 262 (2 self)
- Add to MetaCart
Correspondence should be addressed to W.G. page 1 Summary Sequence similarity between a translated nucleotide sequence and a known biological protein can provide strong evidence for the presence of a homologous coding region, and such similarities can often be identified even between distantly
Maui: Making smartphones last longer with code offload
- In In Proceedings of ACM MobiSys
, 2010
"... This paper presents MAUI, a system that enables fine-grained energy-aware offload of mobile code to the infrastructure. Previous approaches to these problems either relied heavily on programmer support to partition an application, or they were coarse-grained requiring full process (or full VM) migra ..."
Abstract
-
Cited by 246 (8 self)
- Add to MetaCart
that achieves the best energy savings possible under the mobile device’s current connectivity constrains. In our evaluation, we show that MAUI enables: 1) a resource-intensive face recognition application that consumes an order of magnitude less energy, 2) a latency-sensitive arcade game application
DT: GenTHREADER: an efficient and reliable protein fold recognition method for genomic sequences
- J Mol Biol
, 1999
"... A new protein fold recognition method is described which is both fast and reliable. The method uses a traditional sequence alignment algorithm to generate alignments which are then evaluated by a method derived from threading techniques. As a ®nal step, each threaded model is evaluated by a neural n ..."
Abstract
-
Cited by 214 (10 self)
- Add to MetaCart
network in order to produce a single measure of con®dence in the proposed prediction. The speed of the method, along with its sensitivity and very low false-positive rate makes it ideal for automatically predicting the structure of all the proteins in a translated bacterial genome (proteome). The method
Translator
, 1964
"... The operation of a new instrument known as the deep water gamma-radiometer RAG-i, which can measure radioactivity at great ocean depths, is described. The measurements were conducted from aboard the Soviet survey ship "Vityazt " In 1959-1960 during its 31st cruise in the Indian Ocean. The ..."
Abstract
- Add to MetaCart
, compared for various depths, and analyzed with regard to the degree of accuracy. Thus the sensitivity of the radiometer is determined; its threshold being 240 r-disintegratlon (quant)/min/l or 2- 10-10 Curie.
Building high-level features using large scale unsupervised learning
- In International Conference on Machine Learning, 2012. 103
"... We consider the problem of building highlevel, class-specific feature detectors from only unlabeled data. For example, is it possible to learn a face detector using only unlabeled images? To answer this, we train a 9-layered locally connected sparse autoencoder withpoolingandlocalcontrastnormalizati ..."
Abstract
-
Cited by 180 (9 self)
- Add to MetaCart
appears to be a widely-held intuition, our experimental results reveal that it is possible to train a face detector without having to label images as containingafaceornot. Controlexperiments show that this feature detector is robust not only to translation but also to scaling and out-of-plane rotation. We
Behavioral theories and the neurophysiology of reward,
- Annu. Rev. Psychol.
, 2006
"... ■ Abstract The functions of rewards are based primarily on their effects on behavior and are less directly governed by the physics and chemistry of input events as in sensory systems. Therefore, the investigation of neural mechanisms underlying reward functions requires behavioral theories that can ..."
Abstract
-
Cited by 187 (0 self)
- Add to MetaCart
to deliver in neurophysiological laboratory situations requiring hundreds of daily trials. Animals are also sensitive to other, nonvegetative rewards, such as touch to the skin or fur and presentation of novel objects and situations eliciting exploratory responses, but these again are difficult
Finding Security Vulnerabilities in Java Applications with Static Analysis
, 2005
"... This paper proposes a static analysis technique for detecting many recently discovered application vulnerabilities such as SQL injections, cross-site scripting, and HTTP splitting attacks. These vulnerabilities stem from unchecked input, which is widely recognized as the most common source of securi ..."
Abstract
-
Cited by 169 (3 self)
- Add to MetaCart
of security vulnerabilities in Web applications. We propose a static analysis approach based on a scalable and precise points-to analysis. In our system, user-provided specifications of vulnerabilities are automatically translated into static analyzers. Our approach finds all vulnerabilities matching a
Results 1 - 10
of
2,551