Sciweavers

43190 search results - page 123 / 8638
» Can Development Be Designed
Sort
View
SOUPS
2009
ACM
15 years 11 months ago
Look into my eyes!: can you guess my password?
Authentication systems for public terminals – and thus public spaces – have to be fast, easy and secure. Security is of utmost importance since the public setting allows manif...
Alexander De Luca, Martin Denzel, Heinrich Hussman...
BMCBI
2007
153views more  BMCBI 2007»
15 years 4 months ago
Can Clustal-style progressive pairwise alignment of multiple sequences be used in RNA secondary structure prediction?
Background: In ribonucleic acid (RNA) molecules whose function depends on their final, folded three-dimensional shape (such as those in ribosomes or spliceosome complexes), the se...
Amelia B. Bellamy-Royds, Marcel Turcotte
TSMC
2010
14 years 11 months ago
Can You See Me Now? Sensor Positioning for Automated and Persistent Surveillance
Most existing camera placement algorithms focus on coverage and/or visibility analysis, which ensures that the object of interest is visible in the camera's field of view (FOV...
Yi Yao, Chung-Hao Chen, Besma R. Abidi, David L. P...
JCC
2011
154views more  JCC 2011»
14 years 7 months ago
Can we trust docking results? Evaluation of seven commonly used programs on PDBbind database
: Docking is one of the most commonly used techniques in drug design. It is used for both identifying correct poses of a ligand in the binding site of a protein as well as for the ...
Dariusz Plewczynski, Michal Lazniewski, Rafal Augu...
CVPR
2009
IEEE
1096views Computer Vision» more  CVPR 2009»
16 years 11 months ago
How far can you get with a modern face recognition test set using only simple features?
In recent years, large databases of natural images have become increasingly popular in the evaluation of face and object recognition algorithms. However, Pinto et al. previously ...
Nicolas Pinto, James J. DiCarlo, David D. Cox