Sciweavers

5684 search results - page 313 / 1137
» Computing with active dendrites
Sort
View
ICDCS
2002
IEEE
15 years 9 months ago
Design of a Policy-Driven Middleware for Secure Distributed Collaboration
We present here the execution model of a policy-driven middleware for building secure distributed collaboration systems from their high level specifications. Our specification m...
Anand R. Tripathi, Tanvir Ahmed, Richa Kumar, Shre...
STOC
2007
ACM
140views Algorithms» more  STOC 2007»
16 years 5 months ago
On the submodularity of influence in social networks
We prove and extend a conjecture of Kempe, Kleinberg, and Tardos (KKT) on the spread of influence in social networks. A social network can be represented by a directed graph where...
Elchanan Mossel, Sébastien Roch
135
Voted
ECCV
2002
Springer
16 years 6 months ago
Normalized Gradient Vector Diffusion and Image Segmentation
Abstract. In this paper, we present an approach for image segmentation, based on the existing Active Snake Model and Watershed-based Region Merging. Our algorithm includes initial ...
Zeyun Yu, Chandrajit L. Bajaj
AINA
2010
IEEE
15 years 8 months ago
Mnesic Evocation: An Isochron-Based Analysis
—Mnesic evocation occurs under the action of a stimulus. A successful evocation is observed as the overrun of a certain threshold of the neuronal activity followed by a medical i...
Hedi Ben Amor, Jacques Demongeot, Nicolas Glade
BIOCOMP
2008
15 years 6 months ago
Analysis of Protein-Ligand Interactions Using Localized Stereochemical Features
Computational analyses of protein structure-function relationships have traditionally been based on sequence homology, fold family analysis and 3D motifs/templates. Previous struct...
Reetal Pai, James C. Sacchettini, Thomas R. Ioerge...