Sciweavers

5030 search results - page 1005 / 1006
» cases 2007
Sort
View
JCC
2011
154views more  JCC 2011»
13 years 1 months ago
Can we trust docking results? Evaluation of seven commonly used programs on PDBbind database
: Docking is one of the most commonly used techniques in drug design. It is used for both identifying correct poses of a ligand in the binding site of a protein as well as for the ...
Dariusz Plewczynski, Michal Lazniewski, Rafal Augu...
FSKD
2011
Springer
279views Fuzzy Logic» more  FSKD 2011»
12 years 10 months ago
Modelling the seasonal climate variability and its effects on vintage wines from Marlborough, NZ
— The paper presents some interim results from an ongoing research on the application of data/text mining methodologies being investigated to modelling the seasonal climate varia...
Subana Shanmuganathan, Ana Perez Kuroki, Ajit Nara...
IACR
2011
104views more  IACR 2011»
12 years 10 months ago
Collusion Resistant Obfuscation and Functional Re-encryption
Program Obfuscation is the problem of transforming a program into one which is functionally equivalent, yet whose inner workings are completely unintelligible to an adversary. Des...
Nishanth Chandran, Melissa Chase, Vinod Vaikuntana...
CIARP
2007
Springer
14 years 4 months ago
A Method for Estimating Authentication Performance over Time, with Applications to Face Biometrics
Underlying biometrics are biological tissues that evolve over time. Hence, biometric authentication (and recognition in general) is a dynamic pattern recognition problem. We propos...
Norman Poh, Josef Kittler, Raymond S. Smith, Jose ...
KDD
2007
ACM
149views Data Mining» more  KDD 2007»
14 years 10 months ago
Distributed classification in peer-to-peer networks
This work studies the problem of distributed classification in peer-to-peer (P2P) networks. While there has been a significant amount of work in distributed classification, most o...
Ping Luo, Hui Xiong, Kevin Lü, Zhongzhi Shi
« Prev « First page 1005 / 1006 Last » Next »