Sciweavers

150 search results - page 28 / 30
» Detecting anomalous access patterns in relational databases
Sort
View
PAMI
2010
265views more  PAMI 2010»
13 years 5 months ago
WLD: A Robust Local Image Descriptor
—Inspired by Weber’s Law, this paper proposes a simple, yet very powerful and robust local descriptor, called the Weber Local Descriptor (WLD). It is based on the fact that hum...
Jie Chen, Shiguang Shan, Chu He, Guoying Zhao, Mat...
CGO
2008
IEEE
14 years 2 months ago
Automatic array inlining in java virtual machines
Array inlining expands the concepts of object inlining to arrays. Groups of objects and arrays that reference each other are placed consecutively in memory so that their relative ...
Christian Wimmer, Hanspeter Mössenböck
CIKM
2009
Springer
14 years 4 days ago
An empirical study on using hidden markov model for search interface segmentation
This paper describes a hidden Markov model (HMM) based approach to perform search interface segmentation. Automatic processing of an interface is a must to access the invisible co...
Ritu Khare, Yuan An
BIOINFORMATICS
2006
135views more  BIOINFORMATICS 2006»
13 years 7 months ago
Effective similarity measures for expression profiles
It is commonly accepted that genes with similar expression profiles are functionally related. However, there are many ways one can measure the similarity of expression profiles, a...
Golan Yona, William Dirks, Shafquat Rahman, David ...
BMCBI
2008
136views more  BMCBI 2008»
13 years 7 months ago
GPAT: Retrieval of genomic annotation from large genomic position datasets
Background: Recent genome wide transcription factor binding site or chromatin modification mapping analysis techniques, such as chromatin immunoprecipitation (ChIP) linked to DNA ...
Arnaud Krebs, Mattia Frontini, Làszlò...