-
4
-
-
9144257886
-
The Pfam protein families database
-
Alex Bateman, et al. The Pfam Protein Families Database. Nucleic Acids Research(2004) 32:D138-D141.
-
(2004)
Nucleic Acids Research
, vol.32
-
-
Bateman, A.1
-
5
-
-
0037255072
-
The Swiss-Prot protein knowledgebase and its supplement TrEMBL in 2003
-
Boeckmann B., et al.: The Swiss-Prot protein knowledgebase and its supplement TrEMBL in 2003. Nucleic Acids Res. 31:365-370(2003).
-
(2003)
Nucleic Acids Res
, vol.31
, pp. 365-370
-
-
Boeckmann, B.1
-
8
-
-
33746724159
-
Intel IXP 2400 network processor: A second-generation Intel NPU
-
Crowley, P., et al. (Eds.). San Fransisco, CA: Morgan Kaufmann Publishers
-
Chandra, P., et al (2003). Intel IXP 2400 Network Processor: A Second-Generation Intel NPU. Crowley, P., et al. (Eds.), Network Processor Design Issues and Practices vol. 1 (pp.259-275). San Fransisco, CA: Morgan Kaufmann Publishers.
-
(2003)
Network Processor Design Issues and Practices Vol. 1
, vol.1
, pp. 259-275
-
-
Chandra, P.1
-
9
-
-
21644459421
-
Toaster2
-
Crowley, P., et al. (Eds.). San Francisco, CA: Morgan Kaufmann Publishers
-
Marshall, J. (2003). Toaster2. Crowley, P., et al. (Eds.), Network Processor Design Issues and Practices vol. 1 (pp.235-248). San Francisco, CA: Morgan Kaufmann Publishers.
-
(2003)
Network Processor Design Issues and Practices Vol. 1
, vol.1
, pp. 235-248
-
-
Marshall, J.1
-
13
-
-
0024610919
-
A tutorial on hidden Markov models and selected applications in speech recognition
-
Rabiner, L.R. A tutorial on hidden Markov models and selected applications in speech recognition. Proceedings of the IEEE 77:257-86, 1989.
-
(1989)
Proceedings of the IEEE
, vol.77
, pp. 257-286
-
-
Rabiner, L.R.1
-
14
-
-
84968924443
-
-
Haussler, D., Krogh, et al. eds, IEEE Computer Society Press
-
th Annual Hawaii Int'l Conf. on System Sciences, volume 1, 792-802, IEEE Computer Society Press, 1993.
-
(1993)
th Annual Hawaii Int'l Conf. on System Sciences
, vol.1
, pp. 792-802
-
-
-
16
-
-
84976736522
-
Gprof: A call graph execution profiler
-
(Boston, MA, June), Association for Computing Machinery
-
Graham, S., Kessler, P., and McKusick, M. gprof: A Call Graph Execution Profiler. In Proc. of the SIGPLAN '82 Symp. on Compiler Construction (Boston, MA, June 1982), Association for Computing Machinery, pp. 120-126.
-
(1982)
Proc. of the SIGPLAN '82 Symp. on Compiler Construction
, pp. 120-126
-
-
Graham, S.1
Kessler, P.2
McKusick, M.3
-
18
-
-
16244383077
-
-
Free Software Foundation (FSF), GCC Home Page. http://www.gnu.org/sortware/gcc/gcc.html. 2004.
-
(2004)
GCC Home Page
-
-
-
20
-
-
0024904512
-
Recognition of handwritten word: First and second order hidden markov model based approach
-
A. Kundu, Y. He, P. Bahl, "Recognition of handwritten word: first and second order hidden markov model based approach", Pattern recognition, 22(3), 1989
-
(1989)
Pattern Recognition
, vol.22
, Issue.3
-
-
Kundu, A.1
He, Y.2
Bahl, P.3
-
21
-
-
0033115274
-
Applications of hidden Markov chains in image analysis
-
K. Aas, L. Eikvil, R.B. Huseby, "Applications of hidden Markov chains in image analysis", Pattern recognition, 32(4), p. 703, 1999.
-
(1999)
Pattern Recognition
, vol.32
, Issue.4
, pp. 703
-
-
Aas, K.1
Eikvil, L.2
Huseby, R.B.3
-
22
-
-
0033882275
-
Image classification by a two-dimensional hidden Markov model
-
Feb
-
, J. Li, A. Najmi, R.M. Gray, "Image Classification by a Two-Dimensional Hidden Markov Model" IEEE transactions on signal processing, 48(2), p. 517, Feb 2000.
-
(2000)
IEEE Transactions on Signal Processing
, vol.48
, Issue.2
, pp. 517
-
-
Li, J.1
Najmi, A.2
Gray, R.M.3
-
23
-
-
0039065317
-
Stylized facts of daily return series and the hidden Markov model
-
May
-
T. Ryden, et al, "Stylized Facts of Daily Return Series and the Hidden Markov Model", Journal of applied econometrics, 13(3), p. 217, May 1998.
-
(1998)
Journal of Applied Econometrics
, vol.13
, Issue.3
, pp. 217
-
-
Ryden, T.1
-
24
-
-
84969506768
-
Applications of hidden Markov models to detecting multi-stage network attacks
-
IEEE Computer Society Press
-
Dirk Outston et al. "Applications of hidden Markov models to detecting multi-stage network attacks." In Proc. of the 36th Hawaii Int'l Conf. on System Sciences, IEEE Computer Society Press, 334-344, 2003.
-
(2003)
Proc. of the 36th Hawaii Int'l Conf. on System Sciences
, pp. 334-344
-
-
Outston, D.1
-
25
-
-
84858937278
-
-
DeCypherHMM Solution. http://www.timelogic.com/decypher_hmm.htm, 2004.
-
(2004)
DeCypherHMM Solution
-
-
-
29
-
-
84858947511
-
-
Unpublished
-
HMMERHEAD, Unpublished; http://www.cs.huji.ac.il/labs/compbio/hmmerhead/
-
-
-
|