Sciweavers

3657 search results - page 169 / 732
» A Study of Practical Deduplication
Sort
View
SEC
2000
14 years 11 months ago
Using Mobile Agent Results to Create Hard-to-Detect Computer Viruses
The theory of computer viruses has been studied by several authors, though there is no systematic theoretical study up to now. The long time open question in this area is as follo...
Yongge Wang
CORR
2008
Springer
98views Education» more  CORR 2008»
14 years 10 months ago
An Experimental Investigation of XML Compression Tools
This paper presents an extensive experimental study of the state-of-the-art of XML compression tools. The study reports the behavior of nine XML compressors using a large corpus o...
Sherif Sakr
93
Voted
ENGL
2008
133views more  ENGL 2008»
14 years 10 months ago
Cycle Time Forecasting Models for Defect Inspection Process in TFT-LCD Module Assembly
Because most of the procedures in defect inspection process of TFT-LCD module assembly are examined manually through human vision, cycle time estimation for this particular process...
Chien-wen Shen
59
Voted
BMCBI
2006
72views more  BMCBI 2006»
14 years 10 months ago
Cluster analysis of networks generated through homology: automatic identification of important protein communities involved in c
Background: Protein-protein interactions have traditionally been studied on a small scale, using classical biochemical methods to investigate the proteins of interest. More recent...
Pall F. Jonsson, Tamara Cavanna, Daniel Zicha, Pau...
82
Voted
JCP
2008
164views more  JCP 2008»
14 years 8 months ago
K-Cosine Corner Detection
This study presents a boundary-based corner detection method that achieves robust detection for digital objects containing wide angles and various curves using curvature. The bound...
Te-Hsiu Sun