Sciweavers

6318 search results - page 1196 / 1264
» Data Leakage Detection
Sort
View
TMI
2008
91views more  TMI 2008»
15 years 1 months ago
MRI-Based Automated Computer Classification of Probable AD Versus Normal Controls
Automated computer classification (ACC) techniques are needed to facilitate physician's diagnosis of complex diseases in individual patients. We provide an example of ACC usin...
Simon Duchesne, A. Caroli, C. Geroldi, Christian B...
JCP
2007
117views more  JCP 2007»
15 years 1 months ago
Internet Research Support System: An Application for Immediate Feedback in Authentic Internet Research
– A prototype Internet Research Support System is presented based on earlier work on the modeling of online reading behavior and evaluating the reading process and its outcomes. ...
Nasiroh Omar, Colin Higgins, Colin G. Harrison, Di...
KES
2007
Springer
15 years 1 months ago
KeyGraph-based chance discovery for mobile contents management system
Chance discovery provides a way to find rare but very important events for future decision making. It can be applied to stock market prediction, earthquake alarm, intrusion detect...
Kyung-Joong Kim, Myung-Chul Jung, Sung-Bae Cho
COMCOM
2004
153views more  COMCOM 2004»
15 years 1 months ago
BLR: beacon-less routing algorithm for mobile ad hoc networks
Routing of packets in mobile ad hoc networks with a large number of nodes or with high mobility is a very difficult task and current routing protocols do not really scale well wit...
Marc Heissenbüttel, Torsten Braun, Thomas Ber...
126
Voted
BMCBI
2002
110views more  BMCBI 2002»
15 years 1 months ago
Identifying functional relationships among human genes by systematic analysis of biological literature
Background: The availability of biomedical literature in electronic format has made it possible to implement automatic text processing methods to expose implicit relationships amo...
Yong-Chuan Tao, Rudolph L. Leibel
« Prev « First page 1196 / 1264 Last » Next »