Sciweavers

11973 search results - page 2379 / 2395
» Methods for organizational development
Sort
View
DBSEC
2010
196views Database» more  DBSEC 2010»
13 years 7 months ago
Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance
Abstract. This paper describes how to preserve integrity and confidentiality of a directed acyclic graph (DAG) model of provenance database. We show a method to preserve integrity ...
Amril Syalim, Takashi Nishide, Kouichi Sakurai

Publication
181views
13 years 7 months ago
Causality Applicatoin Ontology: A Therory of Definition Derived From Analytical Meditation
Advancing the synthesis of Eastern mind science with Western physical science will require a robust and easy-to-traverse bridge between the atypical apprehensions within meditation...
Samuel R Dismond III
CVPR
2011
IEEE
13 years 7 months ago
2D Nonrigid Partial Shape Matching Using MCMC and Contour Subdivision
Shape matching has many applications in computer vision, such as shape classification, object recognition, object detection, and localization. In 2D cases, shape instances are 2D c...
Y. Cao, Z. Zhang, I. Czogiel, I. Dryden, S. Wang
BMCBI
2010
102views more  BMCBI 2010»
13 years 6 months ago
Predicting protein-protein interactions in unbalanced data using the primary structure of proteins
Background: Elucidating protein-protein interactions (PPIs) is essential to constructing protein interaction networks and facilitating our understanding of the general principles ...
Chi-Yuan Yu, Lih-Ching Chou, Darby Tien-Hao Chang
BMCBI
2010
216views more  BMCBI 2010»
13 years 6 months ago
Bayesian Inference of the Number of Factors in Gene-Expression Analysis: Application to Human Virus Challenge Studies
Background: Nonparametric Bayesian techniques have been developed recently to extend the sophistication of factor models, allowing one to infer the number of appropriate factors f...
Bo Chen, Minhua Chen, John William Paisley, Aimee ...
« Prev « First page 2379 / 2395 Last » Next »