Sciweavers

270 search results - page 45 / 54
» Generation From Under - And Overspecified Structures
Sort
View
VISUALIZATION
2005
IEEE
15 years 3 months ago
Visualization of White Matter Tracts with Wrapped Streamlines
Diffusion tensor imaging is a magnetic resonance imaging method which has gained increasing importance in neuroscience and especially in neurosurgery. It acquires diffusion proper...
Frank Enders, Natascha Sauber, Dorit Merhof, Peter...
CDC
2009
IEEE
179views Control Systems» more  CDC 2009»
15 years 2 months ago
Bayesian network approach to understand regulation of biological processes in cyanobacteria
— Bayesian networks have extensively been used in numerous fields including artificial intelligence, decision theory and control. Its ability to utilize noisy and missing data ...
Thanura R. Elvitigala, Abhay K. Singh, Himadri B. ...
KDD
2009
ACM
175views Data Mining» more  KDD 2009»
15 years 2 months ago
Multi-class protein fold recognition using large margin logic based divide and conquer learning
Inductive Logic Programming (ILP) systems have been successfully applied to solve complex problems in bioinformatics by viewing them as binary classification tasks. It remains an...
Huma Lodhi, Stephen Muggleton, Michael J. E. Stern...
ICDCS
2000
IEEE
15 years 1 months ago
Scheduling with Global Information in Distributed Systems
Buffered coscheduling is a distributed scheduling methodology for time-sharing communicating processes in a distributed system, e.g., PC cluster. The principle mechanisms involved...
Fabrizio Petrini, Wu-chun Feng
SP
1998
IEEE
116views Security Privacy» more  SP 1998»
15 years 1 months ago
Strand Spaces: Why is a Security Protocol Correct?
A strand is a sequence of events; it represents either the execution of legitimate party in a security protocol or else a sequence of actions by a penetrator. A strand space is a ...
F. Javier Thayer, Jonathan C. Herzog, Joshua D. Gu...