Sciweavers

2006 search results - page 40 / 402
» Heuristic Security-Testing Methods
Sort
View
EMMCVPR
2007
Springer
14 years 4 months ago
Decomposing Document Images by Heuristic Search
Abstract. Document decomposition is a basic but crucial step for many document related applications. This paper proposes a novel approach to decompose document images into zones. I...
Dashan Gao, Yizhou Wang
ACMSE
2005
ACM
14 years 3 months ago
Heuristics for dependency conjectures in proteomic signaling pathways
A key issue in the study of protein signaling networks is understanding the relationships among proteins in the network. Understanding these relationships in the context of a netw...
Edward E. Allen, Jacquelyn S. Fetrow, David J. Joh...
IWANN
2005
Springer
14 years 3 months ago
Heuristic Search over a Ranking for Feature Selection
In this work, we suggest a new feature selection technique that lets us use the wrapper approach for finding a well suited feature set for distinguishing experiment classes in hig...
Roberto Ruiz, José Cristóbal Riquelm...
CSB
2005
IEEE
132views Bioinformatics» more  CSB 2005»
14 years 5 days ago
A Fast Shotgun Assembly Heuristic
Genome sequencing opened a new era in genetics allowing the study of genomes at the nucleotide level. However, the chosen method of sequencing produced large numbers of nucleotide...
Christopher Wilks, Sami Khuri
COLING
1996
13 years 11 months ago
Processing Metonymy- a Domain-Model Heuristic Graph Traversal Approach
We address here the treatment of metonymic expressions from a knowledge representation perspective, that is, in the context of a text understanding system which aims to build a co...
Jacques Bouaud, Bruno Bachimont, Pierre Zweigenbau...