Sciweavers

21490 search results - page 4060 / 4298
» Business Process Modeling
Sort
View
133
Voted
BIBE
2003
IEEE
133views Bioinformatics» more  BIBE 2003»
15 years 7 months ago
A Computational Pipeline for Protein Structure Prediction and Analysis at Genome Scale
The tertiary (3D) structure of a protein contains the essential information for understanding the biological function of the protein at the molecular and cellular levels. Traditio...
Manesh J. Shah, Sergei Passovets, Dongsup Kim, Kyl...
145
Voted
ICMENS
2003
IEEE
153views Hardware» more  ICMENS 2003»
15 years 7 months ago
Biologically Inspired Intelligent Robots Using Artificial Muscles
Humans throughout history have always sought to mimic the appearance, mobility, functionality, intelligent operation, and thinking process of biological creatures. This field of b...
Yoseph Bar-Cohen
110
Voted
IEEEPACT
2003
IEEE
15 years 7 months ago
Design Trade-Offs in High-Throughput Coherence Controllers
Recent research shows that the high occupancy of Coherence Controllers (CCs) is a major performance bottleneck in scalable shared-memory multiprocessors. In this paper, we propose...
Anthony-Trung Nguyen, Josep Torrellas
131
Voted
MM
2003
ACM
160views Multimedia» more  MM 2003»
15 years 7 months ago
VideoQA: question answering on news video
When querying a news video archive, the users are interested in retrieving precise answers in the form of a summary that best answers the query. However, current video retrieval s...
Hui Yang, Lekha Chaisorn, Yunlong Zhao, Shi-Yong N...
119
Voted
CCS
2003
ACM
15 years 7 months ago
Enhancing byte-level network intrusion detection signatures with context
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
Robin Sommer, Vern Paxson
« Prev « First page 4060 / 4298 Last » Next »