Sciweavers

335 search results - page 55 / 67
» Control patterns in a healthcare network
Sort
View
WCE
2007
13 years 9 months ago
Face Recognition using Discrete Cosine Transform plus Linear Discriminant Analysis
—Face recognition is a biometric identification method which among the other methods such as, finger print identification, speech recognition, signature and hand written recognit...
M. Hajiarbabi, J. Askari, S. Sadri, M. Saraee
ASIAN
2005
Springer
150views Algorithms» more  ASIAN 2005»
14 years 1 months ago
ACB-R: An Adaptive Clustering-Based Data Replication Algorithm on a P2P Data-Store
Replication on geographically distributed, unreliable, P2P interconnecting nodes can offer high data availability and low network latency for replica access. The challenge is how ...
Junhu Zhang, Dongqing Yang, Shiwei Tang
SWS
2004
ACM
14 years 1 months ago
Trust but verify: authorization for web services
Through web service technology, distributed applications can be built in a exible manner, bringing tremendous power to applications on the web. However, this exibility poses sig...
Christian Skalka, Xiaoyang Sean Wang
BMCBI
2010
153views more  BMCBI 2010»
13 years 6 months ago
DiffCoEx: a simple and sensitive method to find differentially coexpressed gene modules
Background: Large microarray datasets have enabled gene regulation to be studied through coexpression analysis. While numerous methods have been developed for identifying differen...
Bruno M. Tesson, Rainer Breitling, Ritsert C. Jans...
EVOW
2010
Springer
14 years 2 months ago
Learning to Dance through Interactive Evolution
A relatively rare application of artificial intelligence at the nexus of art and music is dance. The impulse shared by all humans to express ourselves through dance represents a u...
Greg A. Dubbin, Kenneth O. Stanley