Sciweavers

15781 search results - page 3135 / 3157
» Evaluating Information Extraction
Sort
View
CN
1999
128views more  CN 1999»
13 years 7 months ago
Intrusion detection systems as evidence
: Although the main aim of IDSs is to detect intrusions to prompt evasive measures, a further aim can be to supply evidence in criminal and civil legal proceedings. However the fea...
Peter Sommer
JCC
1998
71views more  JCC 1998»
13 years 7 months ago
Docking small ligands in flexible binding sites
: A novel procedure for docking ligands in a flexible binding site is presented. It relies on conjugate gradient minimization, during which nonbonded interactions are gradually swi...
Joannis Apostolakis, Andreas Plückthun, Amede...
JUCS
2002
116views more  JUCS 2002»
13 years 7 months ago
Bounded Flooding Routing Algorithm for Provisioning the Globally Optimal Route in a Hierarchical ATM Network
: ATM virtual path (VP) contains bundles of virtual channels (VCs). A VP layer network can be used as a server layer network of VC layer networks and each VC layer network can be a...
Daniel Won-Kyu Hong, Choong Seon Hong, Dong-Sik Yu...
SIGPLAN
1998
13 years 7 months ago
The DrScheme Project: An Overview
DrScheme provides a graphical user interface for editing and interactively evaluating Scheme programs on all major graphical platforms (Windows 95/nt, MacOs, Unix/X). The environm...
Matthias Felleisen, Robert Bruce Findler, Matthew ...
TCSV
2002
108views more  TCSV 2002»
13 years 7 months ago
Pilot-assisted 16-level QAM for wireless video
This paper presents a twin-class transmission system for narrowband radio access channels suitable for handheld video phone and multimedia portable PC applications. The transmissio...
Hamid Gharavi
« Prev « First page 3135 / 3157 Last » Next »