Sciweavers

8486 search results - page 1631 / 1698
» Ordered Enumeration Method
Sort
View
BIBM
2007
IEEE
104views Bioinformatics» more  BIBM 2007»
14 years 2 months ago
A Protocol to Detect Local Affinities Involved in Proteins Distant Interactions
The tridimensional structure of a protein is constrained or stabilized by some local interactions between distant residues of the protein, such as disulfide bonds, electrostatic i...
Christophe Nicolas Magnan, Cécile Capponi, ...
BTW
2007
Springer
183views Database» more  BTW 2007»
14 years 2 months ago
Efficient Reverse k-Nearest Neighbor Estimation
: The reverse k-nearest neighbor (RkNN) problem, i.e. finding all objects in a data set the k-nearest neighbors of which include a specified query object, has received increasing a...
Elke Achtert, Christian Böhm, Peer Kröge...
CASES
2007
ACM
14 years 2 months ago
A simplified java bytecode compilation system for resource-constrained embedded processors
Embedded platforms are resource-constrained systems in which performance and memory requirements of executed code are of critical importance. However, standard techniques such as ...
Carmen Badea, Alexandru Nicolau, Alexander V. Veid...
ELPUB
2007
ACM
14 years 1 months ago
Managing Expectations for Open Access in Greece: Perceptions from the Publishers and Academic Libraries
In Greece, there seems to be a growing level of awareness regarding open access among scholars, faculty staff and information professionals. Indeed, consensus regarding the necess...
G. Christina Banou, A. Petros Kostagiolas
KDD
2010
ACM
232views Data Mining» more  KDD 2010»
14 years 1 months ago
Discovering frequent patterns in sensitive data
Discovering frequent patterns from data is a popular exploratory technique in data mining. However, if the data are sensitive (e.g. patient health records, user behavior records) ...
Raghav Bhaskar, Srivatsan Laxman, Adam Smith, Abhr...
« Prev « First page 1631 / 1698 Last » Next »