Sciweavers

5344 search results - page 1039 / 1069
» Privacy-Preserving Set Operations
Sort
View
BMCBI
2007
141views more  BMCBI 2007»
13 years 10 months ago
Artificial neural network models for prediction of intestinal permeability of oligopeptides
Background: Oral delivery is a highly desirable property for candidate drugs under development. Computational modeling could provide a quick and inexpensive way to assess the inte...
Eunkyoung Jung, Junhyoung Kim, Minkyoung Kim, Dong...
IJNSEC
2008
164views more  IJNSEC 2008»
13 years 10 months ago
Secure Real-Time Streaming Protocol (RTSP) for Hierarchical Proxy Caching
Proxies are commonly used to cache objects, especially multimedia objects, so that clients can enjoy better quality-of-service (QoS) guarantees such as smaller startup latency and...
Yeung Siu Fung, John C. S. Lui, David K. Y. Yau
CG
2007
Springer
13 years 10 months ago
Visual data mining and analysis of software repositories
In this article we describe an ongoing effort to integrate information visualization techniques into the process of configuration management for software systems. Our focus is to...
Lucian Voinea, Alexandru Telea
IJCV
2006
165views more  IJCV 2006»
13 years 10 months ago
A Riemannian Framework for Tensor Computing
Tensors are nowadays a common source of geometric information. In this paper, we propose to endow the tensor space with an affine-invariant Riemannian metric. We demonstrate that ...
Xavier Pennec, Pierre Fillard, Nicholas Ayache
JAIR
2008
157views more  JAIR 2008»
13 years 10 months ago
Learning to Reach Agreement in a Continuous Ultimatum Game
It is well-known that acting in an individually rational manner, according to the principles of classical game theory, may lead to sub-optimal solutions in a class of problems nam...
Steven de Jong, Simon Uyttendaele, Karl Tuyls
« Prev « First page 1039 / 1069 Last » Next »