Sciweavers

2399 search results - page 447 / 480
» Avatar Information Extraction System
Sort
View
NAR
2006
87views more  NAR 2006»
15 years 1 months ago
From genomics to chemical genomics: new developments in KEGG
The increasing amount of genomic and molecular information is the basis for understanding higherorder biological systems, such as the cell and the 15 organism, and their interacti...
Minoru Kanehisa, Susumu Goto, Masahiro Hattori, Ki...
GI
2009
Springer
14 years 11 months ago
Contact Fusion and Multi-Hypotheses Tracking for Low Frequency Active Sonar Data
Abstract: Towed low frequency active sonar systems (LFAS) are used in Anti-Submarine Warfare (ASW) to detect submarines. LFAS systems are hampered by reverberation in shallow water...
Kathrin Seget, Holger Schmaljohann, Arne Schulz
JCDL
2011
ACM
260views Education» more  JCDL 2011»
14 years 4 months ago
Extending digital repository architectures to support disk image preservation and access
Disk images (bitstreams extracted from physical media) can play an essential role in the acquisition and management of digital collections by serving as containers that support da...
Kam Woods, Christopher A. Lee, Simson Garfinkel
CLUSTER
2007
IEEE
15 years 8 months ago
Anomaly localization in large-scale clusters
— A critical problem facing by managing large-scale clusters is to identify the location of problems in a system in case of unusual events. As the scale of high performance compu...
Ziming Zheng, Yawei Li, Zhiling Lan
ESORICS
2008
Springer
15 years 3 months ago
Remote Integrity Check with Dishonest Storage Server
We are interested in this problem: a verifier, with a small and reliable storage, wants to periodically check whether a remote server is keeping a large file x. A dishonest server,...
Ee-Chien Chang, Jia Xu