Sciweavers

3000 search results - page 597 / 600
» Accessing an Information System by Chatting
Sort
View
CMPB
2010
186views more  CMPB 2010»
13 years 7 months ago
GPU-based cone beam computed tomography
The use of cone beam computed tomography (CBCT) is growing in the clinical arena due to its ability to provide 3-D information during interventions, its high diagnostic quality (su...
Peter B. Noël, Alan M. Walczak, Jinhui Xu, Ja...
BMCBI
2006
151views more  BMCBI 2006»
13 years 7 months ago
Machine learning and word sense disambiguation in the biomedical domain: design and evaluation issues
Background: Word sense disambiguation (WSD) is critical in the biomedical domain for improving the precision of natural language processing (NLP), text mining, and information ret...
Hua Xu, Marianthi Markatou, Rositsa Dimova, Hongfa...
BMCBI
2006
133views more  BMCBI 2006»
13 years 7 months ago
Web-based analysis of the mouse transcriptome using Genevestigator
Background: Gene function analysis often requires a complex and laborious sequence of laboratory and computer-based experiments. Choosing an effective experimental design generall...
Oliver Laule, Matthias Hirsch-Hoffmann, Tomas Hruz...
COMCOM
2006
121views more  COMCOM 2006»
13 years 7 months ago
Interactive Transparent Networking: Protocol meta modeling based on EFSM
the extensibility and evolution of network services and protocols had become a major research issue in recent years. The 'programmable' and 'active' network par...
Javed I. Khan, Raid Zaghal
JUCS
2008
113views more  JUCS 2008»
13 years 7 months ago
What is Correctness of Security Protocols?
: As soon as major protocol flaws were discovered empirically -- a good luck that is not older than the early 1990s -- this title question came up to the world. It was soon realise...
Giampaolo Bella