Sciweavers

6047 search results - page 1209 / 1210
» A Scenario Construction Process
Sort
View
PAMI
2012
13 years 18 days ago
Exploring Context and Content Links in Social Media: A Latent Space Method
—Social media networks contain both content and context-specific information. Most existing methods work with either of the two for the purpose of multimedia mining and retrieva...
Guo-Jun Qi, Charu C. Aggarwal, Qi Tian, Heng Ji, T...
101
Voted
CVPR
2012
IEEE
13 years 18 days ago
Center-Shift: An approach towards automatic robust mesh segmentation (ARMS)
In the area of 3D shape analysis, research in mesh segmentation has always been an important topic, as it is a fundamental low-level task which can be utilized in many application...
Mengtian Sun, Yi Fang, Karthik Ramani
BMCBI
2007
162views more  BMCBI 2007»
14 years 10 months ago
Genome-wide identification of specific oligonucleotides using artificial neural network and computational genomic analysis
Background: Genome-wide identification of specific oligonucleotides (oligos) is a computationallyintensive task and is a requirement for designing microarray probes, primers, and ...
Chun-Chi Liu, Chin-Chung Lin, Ker-Chau Li, Wen-Shy...
BMCBI
2007
156views more  BMCBI 2007»
14 years 10 months ago
Predictive modeling of plant messenger RNA polyadenylation sites
Background: One of the essential processing events during pre-mRNA maturation is the posttranscriptional addition of a polyadenine [poly(A)] tail. The 3'-end poly(A) track pr...
Guoli Ji, Jianti Zheng, Yingjia Shen, Xiaohui Wu, ...
119
Voted
ACNS
2009
Springer
193views Cryptology» more  ACNS 2009»
15 years 4 months ago
Cryptanalysis of Twister
In this paper, we present a pseudo-collision attack on the compression function of all Twister variants (224,256,384,512) with complexity of about 226.5 compression function evalua...
Florian Mendel, Christian Rechberger, Martin Schl&...
« Prev « First page 1209 / 1210 Last » Next »