Sciweavers

15781 search results - page 2995 / 3157
» Evaluating Information Extraction
Sort
View
146
Voted
BMCBI
2006
127views more  BMCBI 2006»
15 years 4 months ago
Construction of phylogenetic trees by kernel-based comparative analysis of metabolic networks
Background: To infer the tree of life requires knowledge of the common characteristics of each species descended from a common ancestor as the measuring criteria and a method to c...
Sok June Oh, Je-Gun Joung, Jeong Ho Chang, Byoung-...
CCR
2006
110views more  CCR 2006»
15 years 4 months ago
Estimating network proximity and latency
Network proximity and latency estimation is an important component in discovering and locating services and applications. With the growing number of services and service providers...
Puneet Sharma, Zhichen Xu, Sujata Banerjee, Sung-J...
IJCV
2008
223views more  IJCV 2008»
15 years 4 months ago
Robust Object Detection with Interleaved Categorization and Segmentation
This paper presents a novel method for detecting and localizing objects of a visual category in cluttered real-world scenes. Our approach considers object categorization and figure...
Bastian Leibe, Ales Leonardis, Bernt Schiele
BMCBI
2007
116views more  BMCBI 2007»
15 years 4 months ago
Clustering protein environments for function prediction: finding PROSITE motifs in 3D
Background: Structural genomics initiatives are producing increasing numbers of threedimensional (3D) structures for which there is little functional information. Structure-based ...
Sungroh Yoon, Jessica C. Ebert, Eui-Young Chung, G...
128
Voted
CN
2007
133views more  CN 2007»
15 years 4 months ago
Automatic high-performance reconstruction and recovery
Self-protecting systems require the ability to instantaneously detect malicious activity at run-time and prevent execution. We argue that it is impossible to perfectly self-protec...
Ashvin Goel, Wu-chang Feng, Wu-chi Feng, David Mai...
« Prev « First page 2995 / 3157 Last » Next »