Sciweavers

6137 search results - page 1022 / 1228
» Securing Collaborative Applications
Sort
View
AAAI
1996
13 years 11 months ago
Closed Terminologies in Description Logics
We introduce a predictive concept recognition methodology for description logics based on a new closed terminology assumption. During knowledge engineering, our system adopts the ...
Robert A. Weida
HASKELL
2008
ACM
13 years 11 months ago
Haskell: batteries included
The quality of a programming language itself is only one component in the ability of application writers to get the job done. Programming languages can succeed or fail based on th...
Duncan Coutts, Isaac Potoczny-Jones, Don Stewart
BMCBI
2007
99views more  BMCBI 2007»
13 years 10 months ago
Flexible mapping of homology onto structure with Homolmapper
Background: Over the past decade, a number of tools have emerged for the examination of homology relationships among protein sequences in a structural context. Most recent softwar...
Nathan C. Rockwell, J. Clark Lagarias
JCST
2008
124views more  JCST 2008»
13 years 10 months ago
Clustering by Pattern Similarity
The task of clustering is to identify classes of similar objects among a set of objects. The definition of similarity varies from one clustering model to another. However, in most ...
Haixun Wang, Jian Pei
KDD
2010
ACM
300views Data Mining» more  KDD 2010»
13 years 8 months ago
Using data mining techniques to address critical information exchange needs in disaster affected public-private networks
Crisis Management and Disaster Recovery have gained immense importance in the wake of recent man and nature inflicted calamities. A critical problem in a crisis situation is how t...
Li Zheng, Chao Shen, Liang Tang, Tao Li, Steven Lu...
« Prev « First page 1022 / 1228 Last » Next »