Sciweavers

988 search results - page 60 / 198
» Positive Results and Techniques for Obfuscation
Sort
View
WWW
2004
ACM
14 years 9 months ago
A hybrid approach for searching in the semantic web
This paper presents a search architecture that combines classical search techniques with spread activation techniques applied to a semantic model of a given domain. Given an ontol...
Cristiano Rocha, Daniel Schwabe, Marcus Poggi de A...
JPDC
2011
155views more  JPDC 2011»
12 years 11 months ago
A cellular learning automata-based deployment strategy for mobile wireless sensor networks
: One important problem which may arise in designing a deployment strategy for a wireless sensor network is how to deploy a specific number of sensor nodes throughout an unknown ne...
Mehdi Esnaashari, Mohammad Reza Meybodi
CBMS
2003
IEEE
14 years 2 months ago
An Imaging System Correlating Lip Shapes with Tongue Contact Patterns for Speech Pathology Research
In this research, an imaging system was built to work with a newly developed electronic device to help people produce sounds correctly. The system consists of two parts, the inter...
D. J. Lee, Daniel Bates, Christopher Dromey, Xiaoq...
ICANNGA
2007
Springer
149views Algorithms» more  ICANNGA 2007»
14 years 3 months ago
Using Real-Valued Meta Classifiers to Integrate and Contextualize Binding Site Predictions
Currently the best algorithms for transcription factor binding site predictions are severely limited in accuracy. However, a non-linear combination of these algorithms could improv...
Mark Robinson, Offer Sharabi, Yi Sun, Rod Adams, R...
GOSLER
1995
14 years 15 days ago
A Guided Tour Across the Boundaries of Learning Recursive Languages
The present paper deals with the learnability of indexed families of uniformly recursive languages from positive data as well as from both, positive and negative data. We consider...
Thomas Zeugmann, Steffen Lange