Sciweavers

1298 search results - page 241 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
DAS
2010
Springer
15 years 6 months ago
Detecting and recognizing tables in spreadsheets
Detecting tables in a spreadsheet is the first step needed to make spreadsheet documents accessible to individuals with visual disabilities. Techniques to enable aural presentati...
Iyad Abu Doush, Enrico Pontelli
PRDC
1999
IEEE
15 years 6 months ago
FBD: A Fault-tolerant Buffering Disk System for Improving Write Performance of RAID5 Systems
The parity calculation technique of the RAID5 provides high reliability, efficient disk space usage, and good read performance for parallel-disk-array configurations. However, it ...
Haruo Yokota, Masanori Goto
ICCV
2007
IEEE
16 years 3 months ago
Temporal Segmentation of Facial Behavior
Temporal segmentation of facial gestures in spontaneous facial behavior recorded in real-world settings is an important, unsolved, and relatively unexplored problem in facial imag...
Fernando De la Torre, Joan Campoy, Zara Ambadar, J...
124
Voted
BMCBI
2006
159views more  BMCBI 2006»
15 years 1 months ago
EVEREST: automatic identification and classification of protein domains in all protein sequences
Background: Proteins are comprised of one or several building blocks, known as domains. Such domains can be classified into families according to their evolutionary origin. Wherea...
Elon Portugaly, Amir Harel, Nathan Linial, Michal ...
SDM
2009
SIAM
176views Data Mining» more  SDM 2009»
15 years 11 months ago
Discovery of Geospatial Discriminating Patterns from Remote Sensing Datasets.
Large amounts of remotely sensed data calls for data mining techniques to fully utilize their rich information content. In this paper, we study new means of discovery and summariz...
Wei Ding 0003, Tomasz F. Stepinski, Josue Salazar