Sciweavers

1486 search results - page 278 / 298
» Algorithms for two-box covering
Sort
View
SODA
2008
ACM
104views Algorithms» more  SODA 2008»
13 years 8 months ago
Ranged hash functions and the price of churn
Ranged hash functions generalize hash tables to the setting where hash buckets may come and go over time, a typical case in distributed settings where hash buckets may correspond ...
James Aspnes, Muli Safra, Yitong Yin
ACL
1996
13 years 8 months ago
Chart Generation
Charts constitute a natural uniform architecture for parsing and generation provided string position is replaced by a notion more appropriate to logical forms and that measures ar...
Martin Kay
ECCV
2010
Springer
13 years 8 months ago
Location Recognition Using Prioritized Feature Matching
We present a fast, simple location recognition and image localization method that leverages feature correspondence and geometry estimated from large Internet photo collections. Suc...
Yunpeng Li, Noah Snavely, Daniel P. Huttenlocher
BIODATAMINING
2008
120views more  BIODATAMINING 2008»
13 years 7 months ago
Filling the gap between biology and computer science
This editorial introduces BioData Mining, a new journal which publishes research articles related to advances in computational methods and techniques for the extraction of useful ...
Jesús S. Aguilar-Ruiz, Jason H. Moore, Mary...
BMCBI
2010
154views more  BMCBI 2010»
13 years 7 months ago
Binary image representation of a ligand binding site: its application to efficient sampling of a conformational ensemble
Background: Modelling the ligand binding site of a protein is an important component of understanding proteinligand interactions and is being actively studied. Even if the side ch...
Edon Sung, Sangsoo Kim, Whanchul Shin