The underlying belief and knowledge models assumed by various kinds of authentication protocols have been studied for well over 10 years now. On the other hand, the related questio...
Research performed in the field of computer vision has steadily ignored recent advances in programming tools and techniques, relying on well-established traditional methods, such ...
Background: Contact maps have been extensively used as a simplified representation of protein structures. They capture most important features of a protein's fold, being pref...
Jose M. Duarte, Rajagopal Sathyapriya, Henning Ste...
Objective: Knowledge acquisition and maintenance in medical domains with a large application domain ontology is a difficult task. To reduce knowledge elicitation costs, semiautoma...
Machine learning often relies on costly labeled data, and this impedes its application to new classification and information extraction problems. This has motivated the developme...