Sciweavers

437 search results - page 60 / 88
» An Effective Promoter Detection Method using the Adaboost Al...
Sort
View
JIB
2007
153views more  JIB 2007»
13 years 7 months ago
Duplicate detection of 2D-NMR Spectra
2D-Nuclear magnetic resonance (NMR) spectra are used in the (structural) analysis of small molecules. In contrast to 1D-NMR spectra, 2D-NMR spectra correlate the chemical shifts o...
Alexander Hinneburg, Björn Egert, Andrea Porz...
ICMCS
2005
IEEE
102views Multimedia» more  ICMCS 2005»
14 years 1 months ago
Content-based block watermarking against cumulative and temporal attack
— This paper presents a block-selection-based video watermarking scheme that is designed to be resilient against two dangerous attacks: cumulative attack and temporal attack. We ...
Ju Wang, Jonathan C. L. Liu
IROS
2008
IEEE
116views Robotics» more  IROS 2008»
14 years 2 months ago
A solution for SLAM through augmenting vision and range information
— This paper proposes a method for augmenting the information of a monocular camera and a range finder. This method is a valuable step towards solving the SLAM problem in unstruc...
Ali Akbar Aghamohammadi, Amir Hossein Tamjidi, Ham...
BMCBI
2008
138views more  BMCBI 2008»
13 years 7 months ago
CASCADE: a novel quasi all paths-based network analysis algorithm for clustering biological interactions
Background: Quantitative characterization of the topological characteristics of protein-protein interaction (PPI) networks can enable the elucidation of biological functional modu...
Woochang Hwang, Young-Rae Cho, Aidong Zhang, Mural...
ESORICS
2010
Springer
13 years 8 months ago
Web Browser History Detection as a Real-World Privacy Threat
Web browser history detection using CSS visited styles has long been dismissed as an issue of marginal impact. However, due to recent changes in Web usage patterns, coupled with br...
Artur Janc, Lukasz Olejnik