Sciweavers

4110 search results - page 750 / 822
» Efficient algorithms for the 2-gathering problem
Sort
View
CSB
2004
IEEE
208views Bioinformatics» more  CSB 2004»
15 years 7 months ago
Pair Stochastic Tree Adjoining Grammars for Aligning and Predicting Pseudoknot RNA Structures
Motivation: Since the whole genome sequences for many species are currently available, computational predictions of RNA secondary structures and computational identifications of t...
Hiroshi Matsui, Kengo Sato, Yasubumi Sakakibara
149
Voted
CCS
2006
ACM
15 years 7 months ago
A scalable approach to attack graph generation
Attack graphs are important tools for analyzing security vulnerabilities in enterprise networks. Previous work on attack graphs has not provided an account of the scalability of t...
Xinming Ou, Wayne F. Boyer, Miles A. McQueen
FGR
2004
IEEE
132views Biometrics» more  FGR 2004»
15 years 7 months ago
Expand Training Set for Face Detection by GA Re-sampling
Data collection for both training and testing a classifier is a tedious but essential step towards face detection and recognition. All of the statistical methods suffer from this ...
Jie Chen, Xilin Chen, Wen Gao
VISSYM
2007
15 years 6 months ago
A Tri-Space Visualization Interface for Analyzing Time-Varying Multivariate Volume Data
The dataset generated by a large-scale numerical simulation may include thousands of timesteps and hundreds of variables describing different aspects of the modeled physical pheno...
Hiroshi Akiba, Kwan-Liu Ma
AAAI
2008
15 years 6 months ago
An Architecture and Formalism for Handling Modular Ontologies
The goal of my ongoing work is to provide an architecture for developing and manipulating modular ontologies in such a way that each ontology module can plug into or unplug from a...
Faezeh Ensan