Sciweavers

705 search results - page 106 / 141
» Proximity Cluster Trees
Sort
View
DAS
2010
Springer
13 years 11 months ago
Handwritten Arabic text line segmentation using affinity propagation
In this paper, we present a novel graph-based method for extracting handwritten text lines in monochromatic Arabic document images. Our approach consists of two steps Coarse text ...
Jayant Kumar, Wael Abd-Almageed, Le Kang, David S....
CSCW
2008
ACM
13 years 9 months ago
Range: exploring implicit interaction through electronic whiteboard design
An important challenge in designing ubiquitous computing experiences is negotiating transitions between explicit and implicit interaction, such as how and when to provide users wi...
Wendy Ju, Brian A. Lee, Scott R. Klemmer
BMCBI
2010
144views more  BMCBI 2010»
13 years 7 months ago
Finding sRNA generative locales from high-throughput sequencing data with NiBLS
Background: Next-generation sequencing technologies allow researchers to obtain millions of sequence reads in a single experiment. One important use of the technology is the seque...
Daniel MacLean, Vincent Moulton, David J. Studholm...
BMCBI
2008
135views more  BMCBI 2008»
13 years 7 months ago
Functional site prediction selects correct protein models
Background: The prediction of protein structure can be facilitated by the use of constraints based on a knowledge of functional sites. Without this information it is still possibl...
Vijayalakshmi Chelliah, William R. Taylor
CORR
2008
Springer
107views Education» more  CORR 2008»
13 years 7 months ago
Our Brothers' Keepers: Secure Routing with High Performance
The Trinity [1] spam classification system is based on a distributed hash table that is implemented using a structured peer-to-peer overlay. Such an overlay must be capable of proc...
Alex Brodsky, Scott Lindenberg