Sciweavers

823 search results - page 160 / 165
» The Participatory Paradigm for Applied Information Systems R...
Sort
View
KBS
2000
122views more  KBS 2000»
13 years 7 months ago
Creating knowledge maps by exploiting dependent relationships
Knowledge is an interesting concept that has attracted the attention of philosophers for thousands of years. In more recent times, researchers have investigated knowledge in a mor...
John L. Gordon
MMDB
2003
ACM
132views Multimedia» more  MMDB 2003»
14 years 1 months ago
Image database retrieval utilizing affinity relationships
Recent research effort in Content-Based Image Retrieval (CBIR) focuses on bridging the gap between low-level features and highlevel semantic contents of images as this gap has bec...
Mei-Ling Shyu, Shu-Ching Chen, Min Chen, Chengcui ...
CCS
2006
ACM
13 years 11 months ago
A scalable approach to attack graph generation
Attack graphs are important tools for analyzing security vulnerabilities in enterprise networks. Previous work on attack graphs has not provided an account of the scalability of t...
Xinming Ou, Wayne F. Boyer, Miles A. McQueen
CGIM
2003
13 years 9 months ago
Snake for Band Edge Extraction and Its Applications
A novel snake model suitable for edge extraction of bandshape objects is presented in this paper. Based on the proposed model, an edge tracking system, EdgeTrak, has been develope...
Min Li, Chandra Kambhamettu, Maureen C. Stone
BMCBI
2008
99views more  BMCBI 2008»
13 years 8 months ago
Exhaustive prediction of disease susceptibility to coding base changes in the human genome
Background: Single Nucleotide Polymorphisms (SNPs) are the most abundant form of genomic variation and can cause phenotypic differences between individuals, including diseases. Ba...
Vinayak Kulkarni, Mounir Errami, Robert Barber, Ha...