Sciweavers

5740 search results - page 1100 / 1148
» Application of Level Set Methods in Computer Vision
Sort
View
81
Voted
BMCBI
2007
141views more  BMCBI 2007»
15 years 15 days ago
Artificial neural network models for prediction of intestinal permeability of oligopeptides
Background: Oral delivery is a highly desirable property for candidate drugs under development. Computational modeling could provide a quick and inexpensive way to assess the inte...
Eunkyoung Jung, Junhyoung Kim, Minkyoung Kim, Dong...
102
Voted
TVLSI
2008
139views more  TVLSI 2008»
15 years 11 days ago
Ternary CAM Power and Delay Model: Extensions and Uses
Applications in computer networks often require high throughput access to large data structures for lookup and classification. While advanced algorithms exist to speed these search...
Banit Agrawal, Timothy Sherwood
118
Voted
FLAIRS
2009
14 years 10 months ago
Are Ontologies Involved in Natural Language Processing?
For certain disable persons unable to communicate, we present a palliative aid which consist of a virtual pictographic keyboard associated to a text processing from a pictographic...
Maryvonne Abraham
112
Voted
KDD
2006
ACM
164views Data Mining» more  KDD 2006»
16 years 27 days ago
Sampling from large graphs
Given a huge real graph, how can we derive a representative sample? There are many known algorithms to compute interesting measures (shortest paths, centrality, betweenness, etc.)...
Jure Leskovec, Christos Faloutsos
90
Voted
EDBTW
2010
Springer
15 years 7 months ago
A practice-oriented framework for measuring privacy and utility in data sanitization systems
Published data is prone to privacy attacks. Sanitization methods aim to prevent these attacks while maintaining usefulness of the data for legitimate users. Quantifying the trade-...
Michal Sramka, Reihaneh Safavi-Naini, Jörg De...
« Prev « First page 1100 / 1148 Last » Next »