Sciweavers

727 search results - page 70 / 146
» Making Distortions Comprehensible
Sort
View
BMCBI
2007
116views more  BMCBI 2007»
13 years 7 months ago
MED: a new non-supervised gene prediction algorithm for bacterial and archaeal genomes
Background: Despite a remarkable success in the computational prediction of genes in Bacteria and Archaea, a lack of comprehensive understanding of prokaryotic gene structures pre...
Huaiqiu Zhu, Gang-Qing Hu, Yi-Fan Yang, Jin Wang, ...
ICCV
2007
IEEE
14 years 9 months ago
Graph-Cut Transducers for Relevance Feedback in Content Based Image Retrieval
Closing the semantic gap in content based image retrieval (CBIR) basically requires the knowledge of the user's intention which is usually translated into a sequence of quest...
Hichem Sahbi, Jean-Yves Audibert, Renaud Keriven
ICDE
2007
IEEE
165views Database» more  ICDE 2007»
14 years 9 months ago
On Randomization, Public Information and the Curse of Dimensionality
A key method for privacy preserving data mining is that of randomization. Unlike k-anonymity, this technique does not include public information in the underlying assumptions. In ...
Charu C. Aggarwal
IEEEIAS
2009
IEEE
14 years 2 months ago
Network Security Situation Awareness Using Exponential and Logarithmic Analysis
: Network security situation awareness (NSSA) is a hotspot in the network security research field, and it’s the perception, comprehension, and forecast of network security situat...
Xiaobin Tan, Qin Guihong, Zhang Yong, Liang Ping
TPHOL
2009
IEEE
14 years 2 months ago
Practical Tactics for Separation Logic
Abstract. We present a comprehensive set of tactics that make it practical to use separation logic in a proof assistant. These tactics enable the verification of partial correctne...
Andrew McCreight