Sciweavers

1298 search results - page 218 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
BMCBI
2010
143views more  BMCBI 2010»
15 years 2 months ago
ETE: a python Environment for Tree Exploration
Background: Many bioinformatics analyses, ranging from gene clustering to phylogenetics, produce hierarchical trees as their main result. These are used to represent the relations...
Jaime Huerta-Cepas, Joaquín Dopazo, Toni Ga...
ICDE
2007
IEEE
106views Database» more  ICDE 2007»
15 years 8 months ago
Mining Trajectory Databases via a Suite of Distance Operators
With the rapid progress of mobile devices and positioning technologies, Trajectory Databases (TD) have been in the core of database research during the last decade. Analysis and k...
Nikos Pelekis, Ioannis Kopanakis, Irene Ntoutsi, G...
ESCIENCE
2006
IEEE
15 years 8 months ago
Grid Approach to Embarrassingly Parallel CPU-Intensive Bioinformatics Problems
Bioinformatics algorithms such as sequence alignment methods based on profile-HMM (Hidden Markov Model) are popular but CPU-intensive. If large amounts of data are processed, a s...
Heinz Stockinger, Marco Pagni, Lorenzo Cerutti, La...
ISVD
2010
IEEE
15 years 12 days ago
Alpha Shape Topology of the Cosmic Web
—We study the topology of the Megaparsec Cosmic Web on the basis of the Alpha Shapes of the galaxy distribution. The simplicial complexes of the alpha shapes are used to determin...
Rien van de Weygaert, Erwin Platen, Gert Vegter, B...
ICPR
2006
IEEE
15 years 8 months ago
Audio Segmentation and Speaker Localization in Meeting Videos
Segmenting different individuals in a group meeting and their speech is an important first step for various tasks such as meeting transcription, automatic camera panning, multime...
Himanshu Vajaria, Tanmoy Islam, Sudeep Sarkar, Rav...