Sciweavers

704 search results - page 139 / 141
» Application of kernels to link analysis
Sort
View
BMCBI
2008
110views more  BMCBI 2008»
13 years 5 months ago
Predikin and PredikinDB: a computational framework for the prediction of protein kinase peptide specificity and an associated da
Background: We have previously described an approach to predicting the substrate specificity of serine-threonine protein kinases. The method, named Predikin, identifies key conser...
Neil F. W. Saunders, Ross I. Brinkworth, Thomas Hu...
IJVR
2006
199views more  IJVR 2006»
13 years 5 months ago
Interactive Virtual Humans in Real-Time Virtual Environments
In this paper, we will present an overview of existing research in the vast area of IVH systems. We will also present our ongoing work on improving the expressive capabilities of I...
Nadia Magnenat-Thalmann, Arjan Egges
SIGECOM
2008
ACM
151views ECommerce» more  SIGECOM 2008»
13 years 5 months ago
Security and insurance management in networks with heterogeneous agents
Computer users express a strong desire to prevent attacks and to reduce the losses from computer and information security breaches. However, security compromises are common and wi...
Jens Grossklags, Nicolas Christin, John Chuang
JAIR
2007
132views more  JAIR 2007»
13 years 5 months ago
Using Linguistic Cues for the Automatic Recognition of Personality in Conversation and Text
It is well known that utterances convey a great deal of information about the speaker in addition to their semantic content. One such type of information consists of cues to the s...
François Mairesse, Marilyn A. Walker, Matth...
JSAC
2007
116views more  JSAC 2007»
13 years 5 months ago
Outreach: peer-to-peer topology construction towards minimized server bandwidth costs
Abstract— On-demand and live multimedia streaming applications (such as Internet TV) are well known to utilize a significant amount of bandwidth from media streaming servers, es...
Tara Small, Baochun Li, Ben Liang