Sciweavers

3467 search results - page 605 / 694
» Non-monotonic feature selection
Sort
View
BMCBI
2008
123views more  BMCBI 2008»
13 years 9 months ago
Pol II promoter prediction using characteristic 4-mer motifs: a machine learning approach
Background: Eukaryotic promoter prediction using computational analysis techniques is one of the most difficult jobs in computational genomics that is essential for constructing a...
Firoz Anwar, Syed Murtuza Baker, Taskeed Jabid, Md...
CG
2008
Springer
13 years 9 months ago
Parallel reflective symmetry transformation for volume data
Many volume data possess symmetric features that can be clearly observed, for example, those existing in diffusion tensor image data sets. The exploitations of symmetries for volu...
Yuan Hong, Han-Wei Shen
CGA
2008
13 years 9 months ago
Viewpoint-Based Ambient Occlusion
Ambient occlusion is a powerful technique that mimics indirect global illumination at a fraction of the cost. In this paper, we introduce a new ambient occlusion technique based o...
Francisco González, Mateu Sbert, Miquel Fei...
CGF
2008
144views more  CGF 2008»
13 years 9 months ago
Deformation-Driven Shape Correspondence
Non-rigid 3D shape correspondence is a fundamental and difficult problem. Most applications which require a correspondence rely on manually selected markers. Without user assistan...
Hao Zhang 0002, Alla Sheffer, Daniel Cohen-Or, Qua...
CORR
2010
Springer
149views Education» more  CORR 2010»
13 years 9 months ago
Using Rough Set and Support Vector Machine for Network Intrusion Detection
The main function of IDS (Intrusion Detection System) is to protect the system, analyze and predict the behaviors of users. Then these behaviors will be considered an attack or a ...
Rung Ching Chen, Kai-Fan Cheng, Chia-Fen Hsieh