Results 1 - 10
of
3,402
unknown title
"... Constrain-based analysis of gene deletion on the metabolic flux redistribution of Saccharomyces ..."
Abstract
- Add to MetaCart
Constrain-based analysis of gene deletion on the metabolic flux redistribution of Saccharomyces
Visual interpretation of hand gestures for human-computer interaction: A review
- IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE
, 1997
"... The use of hand gestures provides an attractive alternative to cumbersome interface devices for human-computer interaction (HCI). In particular, visual interpretation of hand gestures can help in achieving the ease and naturalness desired for HCI. This has motivated a very active research area conc ..."
Abstract
-
Cited by 489 (17 self)
- Add to MetaCart
concerned with computer vision-based analysis and interpretation of hand gestures. We survey the literature on visual interpretation of hand gestures in the context of its role in HCI. This discussion is organized on the basis of the method used for modeling, analyzing, and recognizing gestures. Important
R.: Semi-quantitative stability analysis constrains saturation levels in metabolic networks
- In: Proc. Int. Workshop on Comput. Syst. Biol
, 2009
"... Recently structural kinetic modeling has been proposed as an intermediary approach between a full kinetic descrip-tion of metabolic networks and a static constrained-based analysis of them. It extends the null-space analysis by a local stability analysis yielding a parametrization of the Jacobian in ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
Recently structural kinetic modeling has been proposed as an intermediary approach between a full kinetic descrip-tion of metabolic networks and a static constrained-based analysis of them. It extends the null-space analysis by a local stability analysis yielding a parametrization of the Jacobian
Ecologically Meaningful Transformations For Ordination Of Species Data
"... This paper examines how to obtain species biplots in unconstrained or constrained ordination without resorting to the Euclidean distance (used in principal component analysis, PCA, and redundancy analysis, RDA) or the chi-square distance (preserved in correspondence analysis, CA, and canonical corre ..."
Abstract
-
Cited by 208 (8 self)
- Add to MetaCart
This paper examines how to obtain species biplots in unconstrained or constrained ordination without resorting to the Euclidean distance (used in principal component analysis, PCA, and redundancy analysis, RDA) or the chi-square distance (preserved in correspondence analysis, CA, and canonical
Algorithms and applications for approximate nonnegative matrix factorization
- Computational Statistics and Data Analysis
, 2006
"... In this paper we discuss the development and use of low-rank approximate nonnegative matrix factorization (NMF) algorithms for feature extraction and identification in the fields of text mining and spectral data analysis. The evolution and convergence properties of hybrid methods based on both spars ..."
Abstract
-
Cited by 204 (8 self)
- Add to MetaCart
In this paper we discuss the development and use of low-rank approximate nonnegative matrix factorization (NMF) algorithms for feature extraction and identification in the fields of text mining and spectral data analysis. The evolution and convergence properties of hybrid methods based on both
Instruction level power analysis and optimization of software
- Journal of VLSI Signal Processing
, 1996
"... Abstract. The increasing popularity of power constrained mobile computers and embedded computing applications drives the need for analyzing and optimizing power in all the components of a system. Software constitutes a major component of today's systems, and its role is projected togrow even fu ..."
Abstract
-
Cited by 179 (1 self)
- Add to MetaCart
are inadequate for. This paper describes an alternative, measurement based instruction level power analysis approach that provides an accurate and practical way of quantifying the power cost of software. This technique has been applied to three commercial, architecturally di erent processors. The salient results
Analysis of speaker adaptation algorithms for HMM-based speech synthesis and a constrained SMAPLR adaptation algorithm
- IEEE Trans. Audio Speech Lang. Process
, 2009
"... Abstract—In this paper, we analyze the effects of several factors and configuration choices encountered during training and model construction when we want to obtain better and more stable adaptation in HMM-based speech synthesis. We then propose a new adaptation algorithm called constrained structu ..."
Abstract
-
Cited by 90 (28 self)
- Add to MetaCart
Abstract—In this paper, we analyze the effects of several factors and configuration choices encountered during training and model construction when we want to obtain better and more stable adaptation in HMM-based speech synthesis. We then propose a new adaptation algorithm called constrained
PLSA-based Image Auto-Annotation: Constraining the Latent Space
- In Proc. ACM Int. Conf. on Multimedia
, 2004
"... We address the problem of unsupervised image auto-annotation with probabilistic latent space models. Unlike most previous works, which build latent space representations assuming equal relevance for the text and visual modalities, we propose a new way of modeling multi-modal co-occurrences, constrai ..."
Abstract
-
Cited by 75 (5 self)
- Add to MetaCart
-occurrences, constraining the definition of the latent space to ensure its consistency in semantic terms (words), while retaining the ability to jointly model visual information. The concept is implemented by a linked pair of Probabilistic Latent Semantic Analysis (PLSA) models. On a 16000-image collection, we show
NON-NEGATIVE MATRIX FACTORIZATION BASED ON ALTERNATING NON-NEGATIVITY CONSTRAINED LEAST SQUARES AND ACTIVE SET METHOD
"... The non-negative matrix factorization (NMF) determines a lower rank approximation of a ¢¤£¦¥¨§�©���� �� � matrix where an ������������������ � interger is given and nonnegativity is imposed on all components of the factors applied to numerous data analysis problems. In applications where the compone ..."
Abstract
-
Cited by 86 (7 self)
- Add to MetaCart
an algorithm for the NMF based on alternating non-negativity constrained least squares (NMF/ANLS) and the active set based fast algorithm for non-negativity constrained least squares with multiple right hand side vectors, and discuss its convergence properties and a rigorous convergence criterion based
Role-based authorization constraints specification
- ACM Transactions on Information and System Security
, 2000
"... The purpose of access control is to limit the actions on a computer system that a legitimate user can perform. The role-based access control (RBAC) has generated great interest in the security community as a flexible approach in access control. One of important aspects in RBAC is constraints that co ..."
Abstract
-
Cited by 156 (23 self)
- Add to MetaCart
The purpose of access control is to limit the actions on a computer system that a legitimate user can perform. The role-based access control (RBAC) has generated great interest in the security community as a flexible approach in access control. One of important aspects in RBAC is constraints
Results 1 - 10
of
3,402