Sciweavers

861 search results - page 142 / 173
» Predicting Attack-prone Components
Sort
View
AAAI
2011
12 years 7 months ago
Exploiting Phase Transition in Latent Networks for Clustering
In this paper, we model the pair-wise similarities of a set of documents as a weighted network with a single cutoff parameter. Such a network can be thought of an ensemble of unwe...
Vahed Qazvinian, Dragomir R. Radev
TOG
2012
172views Communications» more  TOG 2012»
11 years 10 months ago
Physical face cloning
We propose a complete process for designing, simulating, and fabricating synthetic skin for an animatronics character that mimics the face of a given subject and its expressions. ...
Bernd Bickel, Peter Kaufmann, Mélina Skoura...
TOG
2012
301views Communications» more  TOG 2012»
11 years 10 months ago
An analytic model for full spectral sky-dome radiance
We present a physically-based analytical model of the daytime sky. Based on the results of a first-principles brute force simulation of radiative transfer in the atmosphere, we u...
Lukas Hosek, Alexander Wilkie
AAAI
2012
11 years 10 months ago
Fine-Grained Entity Recognition
Entity Recognition (ER) is a key component of relation extraction systems and many other natural-language processing applications. Unfortunately, most ER systems are restricted to...
Xiao Ling, Daniel S. Weld
RECOMB
2007
Springer
14 years 8 months ago
Pairwise Global Alignment of Protein Interaction Networks by Matching Neighborhood Topology
We describe an algorithm, IsoRank, for global alignment of two protein-protein interaction (PPI) networks. IsoRank aims to maximize the overall match between the two networks; in c...
Rohit Singh, Jinbo Xu, Bonnie Berger