Sciweavers

87 search results - page 15 / 18
» Using Delay to Defend Against Database Extraction
Sort
View
HOTOS
2007
IEEE
13 years 11 months ago
HotComments: How to Make Program Comments More Useful?
Program comments have long been used as a common practice for improving inter-programmer communication and code readability, by explicitly specifying programmers' intentions ...
Lin Tan, Ding Yuan, Yuanyuan Zhou
PR
2010
179views more  PR 2010»
13 years 6 months ago
Robust palmprint verification using 2D and 3D features
This paper presents a new personal authentication system that simultaneously exploits 2D and 3D palmprint features. The objective of our work is to improve accuracy and robustness...
David Zhang, Vivek Kanhangad, Nan Luo, Ajay Kumar
IWVF
2001
Springer
14 years 6 hour ago
Grouping Character Shapes by Means of Genetic Programming
In the framework of an evolutionary approach to machine learning, this paper presents the preliminary version of a learning system that uses Genetic Programming as a tool for autom...
Claudio De Stefano, Antonio Della Cioppa, Angelo M...
BMCBI
2008
242views more  BMCBI 2008»
13 years 7 months ago
annot8r: GO, EC and KEGG annotation of EST datasets
Background: The expressed sequence tag (EST) methodology is an attractive option for the generation of sequence data for species for which no completely sequenced genome is availa...
Ralf Schmid, Mark L. Blaxter
KDD
1998
ACM
140views Data Mining» more  KDD 1998»
13 years 11 months ago
Blurring the Distinction between Command and Data in Scientific KDD
We have been working on two different KDD systems for scientific data. One system involves comparative genomics, where the database contains more than 60,000 plant gene and protei...
John V. Carlis, Elizabeth Shoop, Scott Krieger