A common approach to extract phonemes of sign language is to use an unsupervised clustering algorithm to group the sign segments. However, simple clustering algorithms based on dis...
— Several research groups are working on designing new security architectures for 4G networks such as Hokey and Y-Comm. Since designing an efficient security module requires a cl...
Mahdi Aiash, Glenford E. Mapp, Aboubaker Lasebae, ...
We updated the plant transcription factor (TF) database to version 2.0 (PlantTFDB 2.0, http:// planttfdb.cbi.pku.edu.cn) which contains 53 319 putative TFs predicted from 49 speci...
He Zhang, Jinpu Jin, Liang Tang, Yi Zhao, Xiaochen...
—The pairwise constraints specifying whether a pair of samples should be grouped together or not have been successfully incorporated into the conventional clustering methods such...
Establishing trust between a group of individuals remains a difficult problem. Prior works assume trusted infrastructure, require an individual to trust unknown entities, or provi...