Sciweavers

2526 search results - page 449 / 506
» A Comparative Evaluation of Name-Matching Algorithms
Sort
View
BMCBI
2010
102views more  BMCBI 2010»
13 years 7 months ago
Peptide binding predictions for HLA DR, DP and DQ molecules
Background: MHC class II binding predictions are widely used to identify epitope candidates in infectious agents, allergens, cancer and autoantigens. The vast majority of predicti...
Peng Wang, John Sidney, Yohan Kim, Alessandro Sett...
BMCBI
2006
125views more  BMCBI 2006»
13 years 7 months ago
Automated functional classification of experimental and predicted protein structures
Background: Proteins that are similar in sequence or structure may perform different functions in nature. In such cases, function cannot be inferred from sequence or structural si...
Kai Wang, Ram Samudrala
IJNSEC
2008
131views more  IJNSEC 2008»
13 years 7 months ago
Performance Analysis of Soft Computing Based Anomaly Detectors
Anomaly detectors have become a necessary component of the computer and information security framework. Some of the numerous drawbacks experienced by the current Anomaly detectors...
N. Srinivasan, V. Vaidehi
JSAT
2008
99views more  JSAT 2008»
13 years 7 months ago
A Switching Criterion for Intensification and Diversification in Local Search for SAT
We propose a new switching criterion, namely the evenness or unevenness of the distribution of variable weights, and use this criterion to combine intensification and diversificat...
Wanxia Wei, Chu Min Li, Harry Zhang
PR
2008
328views more  PR 2008»
13 years 7 months ago
Activity based surveillance video content modelling
This paper tackles the problem of surveillance video content modelling. Given a set of surveillance videos, the aims of our work are twofold: firstly a continuous video is segment...
Tao Xiang, Shaogang Gong