Search
Now showing items 31-40 of 118
R/BHC: fast Bayesian hierarchical clustering for microarray data
(BMC Bioinformatics 2009, 2009-08-06)
Abstract Background Although the use of clustering methods has rapidly become one of the standard computational approaches in the literature of microarray gene expression data analysis, little attention has been paid to ...
Modelling of an unbonded CFRP strap shear retrofitting system for RC beams
(American Society of Civil EngineersASCE Journal of Composites for Construction, 2009)
A retrofitting technique has been developed that uses carbon fiber-reinforced polymer (CFRP) straps to increase the shear capacity of reinforced concrete beams. The vertical straps are not bonded to the beam but are instead ...
Three viewpoints on semi-abelian homology
(University of CambridgeDepartment of Pure Mathematics and Mathematical StatisticisEmmanuel College, 2009-11-17)
The main theme of the thesis is to present and compare three different viewpoints on semi-abelian homology, resulting in three ways of defining and calculating homology objects. Any two of these three homology theories ...
Autonomous Pseudomonoids
(University of CambridgeDepartment of Pure Mathematics and Mathematical Statistics, 2009-04-25)
In this dissertation we generalise the basic theory of Hopf algebras to the context of autonomous pseudomonoids in monoidal bicategories.
...
Comparing Grothendieck-Witt Groups of a Complex Variety to its Real Topological K-Groups
(Department of Pure Mathematics and Mathematical Statistics, University of Cambridge, 2009-01)
On a complex variety X, two different approaches to K-theory are available: the
algebraic K-theory of the variety, and the topological K-theory of the underlying
topological space. In this context, the algebraic variant ...
Managing economic value and uncertainty on software projects : an empirical study with the CASSE framework
(2009)
Lack of adaptive-predictor models in software development renders the decision-making process complex, principally when evaluating investment options. Prior work has presented various approaches which are still non-integrated, ...
Usable authentication for mobile banking
(2009)
This dissertation describes the design of two mobile authentication techniques: combinational graphical passwords and gesture passwords. These systems were implemented as prototypes. The prototypes along with a PIN ...
An Overview of MOOS-IvP and a Brief Users Guide to the IvP Helm Autonomy Software
(2009-06-18)
This document describes the IvP Helm - an Open Source behavior-based autonomy application for unmanned vehicles. IvP is short for interval programming - a technique for representing and solving multi-objective optimizations ...
Enhanced Visual Authoring Using Operation History
(2009-06-24)
Graphical editors have introduced great flexibility to the designer's workflow, providing powerful digital tools and enabling the creation of complex and compelling designs. This thesis presents methods for improving these ...