Abstract. We propose a conceptual model for semantic search and implement it in security access control. The model provides security access control to extend the search capabilitie...
Transferring knowledge from one domain to another is challenging due to a number of reasons. Since both conditional and marginal distribution of the training data and test data ar...
Protein secondary structure prediction is an important step towards understanding the relation between protein sequence and structure. However, most current prediction methods use...
Yan Liu, Jaime G. Carbonell, Judith Klein-Seethara...
Invariant feature representations for 3D objects are one of the basic needs in 3D object retrieval and classification. One tool to obtain rotation invariance are Spherical Harmonic...
Email spam is a much studied topic, but even though current email spam detecting software has been gaining a competitive edge against text based email spam, new advances in spam g...