Sciweavers

36320 search results - page 7012 / 7264
» From Code to Models
Sort
View
220
Voted
SIGIR
2012
ACM
13 years 7 months ago
TwiNER: named entity recognition in targeted twitter stream
Many private and/or public organizations have been reported to create and monitor targeted Twitter streams to collect and understand users’ opinions about the organizations. Tar...
Chenliang Li, Jianshu Weng, Qi He, Yuxia Yao, Anwi...
COMPGEOM
2010
ACM
15 years 9 months ago
Orthogonal range reporting: query lower bounds, optimal structures in 3-d, and higher-dimensional improvements
Orthogonal range reporting is the problem of storing a set of n points in d-dimensional space, such that the k points in an axis-orthogonal query box can be reported efficiently. ...
Peyman Afshani, Lars Arge, Kasper Dalgaard Larsen
ACSW
2007
15 years 6 months ago
Developing CIMA-Based Cyberinfrastructure for Remote Access to Scientific Instruments and Collaborative e-Research
An infrastructure for remote instrument access, data acquisition and data management is being developed for e-Research. The Common Instrument Middleware Architecture (CIMA) is bei...
Ian M. Atkinson, Douglas du Boulay, Clinton Chee, ...
BMCBI
2007
167views more  BMCBI 2007»
15 years 4 months ago
AlzPharm: integration of neurodegeneration data using RDF
Background: Neuroscientists often need to access a wide range of data sets distributed over the Internet. These data sets, however, are typically neither integrated nor interopera...
Hugo Y. K. Lam, Luis N. Marenco, Tim Clark, Yong G...
ISI
2008
Springer
15 years 4 months ago
Real time intrusion prediction, detection and prevention programs
An Intrusion Detection Program (IDP) analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. In this talk, we p...
A. Abraham
« Prev « First page 7012 / 7264 Last » Next »