Sciweavers

5722 search results - page 1135 / 1145
» Security Function Interactions
Sort
View
BMCBI
2004
144views more  BMCBI 2004»
13 years 8 months ago
PASBio: predicate-argument structures for event extraction in molecular biology
Background: The exploitation of information extraction (IE), a technology aiming to provide instances of structured representations from free-form text, has been rapidly growing w...
Tuangthong Wattarujeekrit, Parantu K. Shah, Nigel ...
BSL
2004
110views more  BSL 2004»
13 years 8 months ago
Notes on quasiminimality and excellence
This paper ties together much of the model theory of the last 50 years. Shelah's attempts to generalize the Morley theorem beyond first order logic led to the notion of excel...
John T. Baldwin
CORR
2004
Springer
208views Education» more  CORR 2004»
13 years 8 months ago
Business Intelligence from Web Usage Mining
The rapid e-commerce growth has made both business community and customers face a new situation. Due to intense competition on the one hand and the customer's option to choose...
Ajith Abraham
CCR
2000
113views more  CCR 2000»
13 years 8 months ago
TCP rate control
TCP congestion control 9] is designed for network stability, robustness and opportunistic use of network bu er and bandwidth resources on an end-to-end per-connection basis. Upon ...
Shrikrishna Karandikar, Shivkumar Kalyanaraman, Pr...
CGF
2002
110views more  CGF 2002»
13 years 8 months ago
Free-form sketching with variational implicit surfaces
With the advent of sketch-based methods for shape construction, there's a new degree of power available in the rapid creation of approximate shapes. Sketch [Zeleznik, 1996] s...
Olga A. Karpenko, John F. Hughes, Ramesh Raskar
« Prev « First page 1135 / 1145 Last » Next »