Sciweavers

69 search results - page 10 / 14
» Detection of Critical Structures in Scale Space
Sort
View
BMCBI
2007
148views more  BMCBI 2007»
13 years 7 months ago
Blast sampling for structural and functional analyses
Background: The post-genomic era is characterised by a torrent of biological information flooding the public databases. As a direct consequence, similarity searches starting with ...
Anne Friedrich, Raymond Ripp, Nicolas Garnier, Emm...
WCNC
2008
IEEE
14 years 1 months ago
Developing Security Solutions for Wireless Mesh Enterprise Networks
—Our study on the deployment topology and communication characteristics of wireless mesh enterprise networks (WMENs) leads to three critical security challenges: (a) deployment o...
Md. Abdul Hamid, Md. Shariful Islam, Choong Seon H...
VLDB
2007
ACM
161views Database» more  VLDB 2007»
14 years 7 months ago
Proof-Infused Streams: Enabling Authentication of Sliding Window Queries On Streams
As computer systems are essential components of many critical commercial services, the need for secure online transactions is now becoming evident. The demand for such application...
Feifei Li, Ke Yi, Marios Hadjieleftheriou, George ...
ECCV
2006
Springer
13 years 9 months ago
Robust Face Alignment Based on Hierarchical Classifier Network
Abstract. Robust face alignment is crucial for many face processing applications. As face detection only gives a rough estimation of face region, one important problem is how to al...
Li Zhang, Haizhou Ai, Shihong Lao
CLUSTER
2007
IEEE
14 years 1 months ago
Anomaly localization in large-scale clusters
— A critical problem facing by managing large-scale clusters is to identify the location of problems in a system in case of unusual events. As the scale of high performance compu...
Ziming Zheng, Yawei Li, Zhiling Lan