Sciweavers

4529 search results - page 887 / 906
» Position Based Cryptography
Sort
View
BMCBI
2005
125views more  BMCBI 2005»
13 years 10 months ago
Query3d: a new method for high-throughput analysis of functional residues in protein structures
Background: The identification of local similarities between two protein structures can provide clues of a common function. Many different methods exist for searching for similar ...
Gabriele Ausiello, Allegra Via, Manuela Helmer-Cit...
JIB
2007
153views more  JIB 2007»
13 years 10 months ago
Duplicate detection of 2D-NMR Spectra
2D-Nuclear magnetic resonance (NMR) spectra are used in the (structural) analysis of small molecules. In contrast to 1D-NMR spectra, 2D-NMR spectra correlate the chemical shifts o...
Alexander Hinneburg, Björn Egert, Andrea Porz...
JISE
2007
116views more  JISE 2007»
13 years 10 months ago
Mining Navigation Behaviors for Term Suggestion of Search Engines
Query expansion is extensively applied in information retrieval systems, such as search engines. Most conventional approaches to query expansion have been developed based on textua...
Hahn-Ming Lee, Chi-Chun Huang, Wei-Tang Hung
TROB
2008
93views more  TROB 2008»
13 years 10 months ago
Using Sensor Morphology for Multirobot Formations
In formation-maintenance (formation control) tasks, robots maintain their relative position with respect to their peers, according to a desired geometric shape. Previous work has e...
Gal A. Kaminka, Ruti Schechter-Glick, Vladimir Sad...
JMM2
2007
132views more  JMM2 2007»
13 years 10 months ago
Contour Tracking of Targets with Large Aspect Change
In this paper we present a novel method for tracking contour of a moving rigid object in natural video sequences from a mobile camera. While a mobile camera is keeping track of a m...
Behzad Jamasbi, Seyed Ahmad Motamedi, Alireza Behr...