Sciweavers

2877 search results - page 188 / 576
» Computational Biology
Sort
View
TEC
2002
166views more  TEC 2002»
15 years 4 months ago
An artificial immune system architecture for computer security applications
With increased global interconnectivity, reliance on e-commerce, network services, and Internet communication, computer security has become a necessity. Organizations must protect ...
Paul K. Harmer, Paul D. Williams, Gregg H. Gunsch,...
ISBI
2004
IEEE
16 years 5 months ago
Multiple-Image Computed Tomography
We have recently proposed and investigated a planar imaging method called multiple-image radiography (MIR) that concurrently produces three two-dimensional images that reveal info...
Miles N. Wernick, Jovan G. Brankov, Dean Chapman, ...
SIGMOD
2004
ACM
154views Database» more  SIGMOD 2004»
16 years 4 months ago
Computing Clusters of Correlation Connected Objects
The detection of correlations between different features in a set of feature vectors is a very important data mining task because correlation indicates a dependency between the fe...
Christian Böhm, Karin Kailing, Peer Krög...
148
Voted
IJCNN
2006
IEEE
15 years 10 months ago
Shaping Realistic Neuronal Morphologies: An Evolutionary Computation Method
— Neuronal morphology plays a crucial role in the information processing capabilities of neurons. Despite the importance of morphology for neural functionality, biological data i...
Ben Torben-Nielsen, Karl Tuyls, Eric O. Postma
ISAAC
2005
Springer
113views Algorithms» more  ISAAC 2005»
15 years 10 months ago
Fast Algorithms for Computing the Tripartition-Based Distance Between Phylogenetic Networks
Consider two phylogenetic networks N and N′ of size n. The tripartition-based distance finds the proportion of tripartitions which are not shared by N and N′ . This distance i...
Nguyen Bao Nguyen, C. Thach Nguyen, Wing-Kin Sung