Sciweavers

7168 search results - page 1336 / 1434
» A Factorization Approach to Grouping
Sort
View
JNW
2008
83views more  JNW 2008»
15 years 4 months ago
Substantiating Timing and Behavioral Anomalies in Wireless LANs Using GCL
With the increasing dependence on wireless LANs (WLANs), businesses, educational institutions and other organizations are in need of a reliable security mechanism. The latest secur...
Elankayer Sithirasenan, Vallipuram Muthukkumarasam...
156
Voted
JASIS
2006
96views more  JASIS 2006»
15 years 4 months ago
Learning to classify documents according to genre
Genre or style analysis can be used to improve results achieved using standard IR techniques. A genre class is a group of documents that are written in a similar style. Genre clas...
Aidan Finn, Nicholas Kushmerick
JCB
2006
138views more  JCB 2006»
15 years 4 months ago
Recognition and Classification of Histones Using Support Vector Machine
Histones are DNA-binding proteins found in the chromatin of all eukaryotic cells. They are highly conserved and can be grouped into five major classes: H1/H5, H2A, H2B, H3, and H4...
Manoj Bhasin, Ellis L. Reinherz, Pedro A. Reche
JCB
2006
107views more  JCB 2006»
15 years 4 months ago
Protein Image Alignment via Piecewise Affine Transformations
Abstract We present a new approach for aligning families of 2D gels. Instead of choosing one of the gels as reference and performing pairwise alignment, we construct an ideal gel t...
Florian A. Potra, Xing Liu, Françoise Seill...
DSS
2007
226views more  DSS 2007»
15 years 4 months ago
Dare to share: Protecting sensitive knowledge with data sanitization
chool of Business Research – FY 2007 Research Abstracts Dare to Share: Protecting Sensitive Knowledge with Data Sanitization Data sanitization is a process that is used to promot...
Ali Amiri
« Prev « First page 1336 / 1434 Last » Next »