Sciweavers

6438 search results - page 1285 / 1288
» A Parameterised Search System
Sort
View
CORR
2010
Springer
155views Education» more  CORR 2010»
14 years 7 months ago
A Proof Theoretic Analysis of Intruder Theories
We consider the problem of intruder deduction in security protocol analysis: that is, deciding whether a given message M can be deduced from a set of messages under the theory of ...
Alwen Tiu, Rajeev Goré, Jeremy E. Dawson
CIKM
2010
Springer
14 years 6 months ago
A late fusion approach to cross-lingual document re-ranking
The field of information retrieval still strives to develop models which allow semantic information to be integrated in the ranking process to improve performance in comparison to...
Dong Zhou, Séamus Lawless, Jinming Min, Vin...
BMCBI
2011
14 years 4 months ago
CNV-WebStore: Online CNV Analysis, Storage and Interpretation
Background: Microarray technology allows the analysis of genomic aberrations at an ever increasing resolution, making functional interpretation of these vast amounts of data the m...
Geert Vandeweyer, Edwin Reyniers, Wim Wuyts, Liesb...
NAR
2011
330views Computer Vision» more  NAR 2011»
14 years 4 months ago
Hymenoptera Genome Database: integrated community resources for insect species of the order Hymenoptera
The Hymenoptera Genome Database (HGD) is a comprehensive model organism database that caters to the needs of scientists working on insect species of the order Hymenoptera. This sy...
Monica C. Munoz-Torres, Justin T. Reese, Christoph...
TVCG
2011
163views more  TVCG 2011»
14 years 4 months ago
Scan-Based Volume Animation Driven by Locally Adaptive Articulated Registrations
—This paper describes a complete system to create anatomically accurate example-based volume deformation and animation of articulated body regions, starting from multiple in vivo...
Taehyun Rhee, John P. Lewis, Ulrich Neumann, Krish...
« Prev « First page 1285 / 1288 Last » Next »