Sciweavers

413 search results - page 61 / 83
» Computational Experiments with Minimum-Distance Controlled P...
Sort
View
ICCV
2009
IEEE
15 years 2 months ago
Evaluating Information Contributions of Bottom-up and Top-down Processes
This paper presents a method to quantitatively evaluate information contributions of individual bottom-up and topdown computing processes in object recognition. Our objective is...
Xiong Yang, Tianfu Wu, Song-Chun Zhu
SAC
2010
ACM
14 years 4 months ago
Botzilla: detecting the "phoning home" of malicious software
Hosts infected with malicious software, so called malware, are ubiquitous in today’s computer networks. The means whereby malware can infiltrate a network are manifold and rang...
Konrad Rieck, Guido Schwenk, Tobias Limmer, Thorst...
MICCAI
2000
Springer
14 years 1 months ago
Motion-Based Robotic Instrument Targeting under C-Arm Fluoroscopy
: We present a simple and precise robot targeting method under portable x-ray fluoroscopy based on image servoing. The method is implemented for needle alignment in percutaneous pr...
Alexandru Patriciu, Dan Stoianovici, Louis L. Whit...
BMCBI
2006
158views more  BMCBI 2006»
13 years 9 months ago
Detection of non-coding RNAs on the basis of predicted secondary structure formation free energy change
Background: Non-coding RNAs (ncRNAs) have a multitude of roles in the cell, many of which remain to be discovered. However, it is difficult to detect novel ncRNAs in biochemical s...
Andrew V. Uzilov, Joshua M. Keegan, David H. Mathe...
BMCBI
2005
160views more  BMCBI 2005»
13 years 9 months ago
Data-poor categorization and passage retrieval for Gene Ontology Annotation in Swiss-Prot
Background: In the context of the BioCreative competition, where training data were very sparse, we investigated two complementary tasks: 1) given a Swiss-Prot triplet, containing...
Frédéric Ehrler, Antoine Geissbü...