Sciweavers

859 search results - page 158 / 172
» Modeling and Deformation Method of Human Body Model Based on...
Sort
View
SP
2010
IEEE
210views Security Privacy» more  SP 2010»
13 years 11 months ago
Reconciling Belief and Vulnerability in Information Flow
Abstract—Belief and vulnerability have been proposed recently to quantify information flow in security systems. Both concepts stand as alternatives to the traditional approaches...
Sardaouna Hamadou, Vladimiro Sassone, Catuscia Pal...
BMCBI
2006
100views more  BMCBI 2006»
13 years 7 months ago
Using the nucleotide substitution rate matrix to detect horizontal gene transfer
Background: Horizontal gene transfer (HGT) has allowed bacteria to evolve many new capabilities. Because transferred genes perform many medically important functions, such as conf...
Micah Hamady, M. D. Betterton, Rob Knight
SIGIR
2006
ACM
14 years 1 months ago
Probabilistic latent query analysis for combining multiple retrieval sources
Combining the output from multiple retrieval sources over the same document collection is of great importance to a number of retrieval tasks such as multimedia retrieval, web retr...
Rong Yan, Alexander G. Hauptmann
LAWEB
2003
IEEE
14 years 25 days ago
Towards an Ontology for Software Metrics and Indicators as the Foundation for a Cataloging Web System
In order to the software and web measurement field becomes a more robust engineering discipline it is mandatory to start reaching a common agreement between researchers and other s...
María de los Angeles Martín, Luis Ol...
CEC
2007
IEEE
13 years 11 months ago
Evolving hypernetwork classifiers for microRNA expression profile analysis
Abstract-- High-throughput microarrays inform us on different outlooks of the molecular mechanisms underlying the function of cells and organisms. While computational analysis for ...
Sun Kim, Soo-Jin Kim, Byoung-Tak Zhang