Sciweavers

7109 search results - page 1415 / 1422
» Process Algebra with Combinators
Sort
View
JAMIA
2010
116views more  JAMIA 2010»
13 years 2 months ago
Extracting Rx information from clinical narrative
Objective The authors used the i2b2 Medication Extraction Challenge to evaluate their entity extraction methods, contribute to the generation of a publicly available collection of...
James G. Mork, Olivier Bodenreider, Dina Demner-Fu...
SIAMIS
2010
156views more  SIAMIS 2010»
13 years 2 months ago
Learning the Morphological Diversity
This article proposes a new method for image separation into a linear combination of morphological components. Sparsity in fixed dictionaries is used to extract the cartoon and osc...
Gabriel Peyré, Jalal Fadili, Jean-Luc Starc...
SOICT
2010
13 years 2 months ago
Password recovery for encrypted ZIP archives using GPUs
Protecting data by passwords in documents such as DOC, PDF or RAR, ZIP archives has been demonstrated to be weak under dictionary attacks. Time for recovering the passwords of suc...
Pham Hong Phong, Phan Duc Dung, Duong Nhat Tan, Ng...
TASLP
2010
167views more  TASLP 2010»
13 years 2 months ago
Broadband Source Localization From an Eigenanalysis Perspective
Abstract--Broadband source localization has several applications ranging from automatic video camera steering to target signal tracking and enhancement through beamforming. Consequ...
Mehrez Souden, Jacob Benesty, Sofiène Affes
TIP
2010
170views more  TIP 2010»
13 years 2 months ago
Tracking and Activity Recognition Through Consensus in Distributed Camera Networks
Camera networks are being deployed for various applications like security and surveillance, disaster response and environmental modeling. However, there is little automated process...
Bi Song, Ahmed T. Kamal, Cristian Soto, Chong Ding...
« Prev « First page 1415 / 1422 Last » Next »