Sciweavers

1466 search results - page 227 / 294
» Completeness of the Authentication Tests
Sort
View
BMCBI
2006
97views more  BMCBI 2006»
13 years 7 months ago
PDA: Pooled DNA analyzer
Background: Association mapping using abundant single nucleotide polymorphisms is a powerful tool for identifying disease susceptibility genes for complex traits and exploring pos...
Hsin-Chou Yang, Chia-Ching Pan, Chin-Yu Lin, Cathy...
CG
2006
Springer
13 years 7 months ago
Shape reasoning and understanding
s: clustering, denoising, sharp feature, shape abstraction, reverse engineering In this paper we describe a hierarchical face clustering algorithm for triangle meshes based on fit...
Bianca Falcidieno, Remco C. Veltkamp
CGF
2006
128views more  CGF 2006»
13 years 7 months ago
Computing discrete shape operators on general meshes
Discrete curvature and shape operators, which capture complete information about directional curvatures at a point, are essential in a variety of applications: simulation of defor...
Eitan Grinspun, Yotam I. Gingold, Jason Reisman, D...
CORR
2006
Springer
133views Education» more  CORR 2006»
13 years 7 months ago
IP over P2P: Enabling Self-configuring Virtual IP Networks for Grid Computing
Abstract-- Peer-to-peer (P2P) networks have mostly focused on task oriented networking, where networks are constructed for single applications, i.e. file-sharing, DNS caching, etc....
Arijit Ganguly, Abhishek Agrawal, P. Oscar Boykin,...
DATAMINE
2006
117views more  DATAMINE 2006»
13 years 7 months ago
A Rule-Based Approach for Process Discovery: Dealing with Noise and Imbalance in Process Logs
Effective information systems require the existence of explicit process models. A completely specified process design needs to be developed in order to enact a given business proce...
Laura Maruster, A. J. M. M. Weijters, Wil M. P. va...