Sciweavers

204 search results - page 28 / 41
» The Organizing Pattern of Interaction: A Knowledge Centric A...
Sort
View
TEC
2002
166views more  TEC 2002»
13 years 6 months ago
An artificial immune system architecture for computer security applications
With increased global interconnectivity, reliance on e-commerce, network services, and Internet communication, computer security has become a necessity. Organizations must protect ...
Paul K. Harmer, Paul D. Williams, Gregg H. Gunsch,...
BMCBI
2007
152views more  BMCBI 2007»
13 years 6 months ago
Difference-based clustering of short time-course microarray data with replicates
Background: There are some limitations associated with conventional clustering methods for short time-course gene expression data. The current algorithms require prior domain know...
Jihoon Kim, Ju Han Kim
ECAIW
2008
Springer
13 years 8 months ago
An Autonomous Algorithm for Generating and Merging Clinical Algorithms
Abstract. Procedural knowledge in medicine uses to come expressed as isolated sentences in Clinical Practice Guidelines (CPG) that describe how to act in front of specific health-c...
Francis Real, David Riaño
JCNS
2008
117views more  JCNS 2008»
13 years 6 months ago
Dendritic action potentials connect distributed dendrodendritic microcircuits
Lateral inhibition of cells surrounding an excited area is a key property of sensory systems, sharpening the preferential tuning of individual cells in the presence of closely rela...
Michele Migliore, Gordon M. Shepherd
AAAI
2006
13 years 8 months ago
Exploring GnuGo's Evaluation Function with a SVM
While computers have defeated the best human players in many classic board games, progress in Go remains elusive. The large branching factor in the game makes traditional adversar...
Christopher Fellows, Yuri Malitsky, Gregory Wojtas...