Sciweavers

11589 search results - page 2168 / 2318
» Human computation
Sort
View
137
Voted
BMCBI
2005
112views more  BMCBI 2005»
15 years 3 months ago
Towards precise classification of cancers based on robust gene functional expression profiles
Background: Development of robust and efficient methods for analyzing and interpreting high dimension gene expression profiles continues to be a focus in computational biology. Th...
Zheng Guo, Tianwen Zhang, Xia Li, Qi Wang, Jianzhe...
133
Voted
IJCV
2002
99views more  IJCV 2002»
15 years 3 months ago
Subjective Surfaces: A Geometric Model for Boundary Completion
We present a geometric model and a computational method for segmentation of images with missing boundaries. In many situations, the human visual system fills in missing gaps in ed...
Alessandro Sarti, Ravi Malladi, James A. Sethian
135
Voted
MOBISYS
2007
ACM
16 years 3 months ago
Context-for-wireless: context-sensitive energy-efficient wireless data transfer
Ubiquitous connectivity on mobile devices will enable numerous new applications in healthcare and multimedia. We set out to check how close we are towards ubiquitous connectivity ...
Ahmad Rahmati, Lin Zhong
JOBIM
2000
15 years 7 months ago
InterDB, a Prediction-Oriented Protein Interaction Database for C. elegans
Protein-protein interactions are critical to many biological processes, extending from the formation of cellular macromolecular structures and enzymatic complexes to the regulation...
Nicolas Thierry-Mieg, Laurent Trilling
150
Voted
WISEC
2010
ACM
15 years 3 months ago
Mobile user location-specific encryption (MULE): using your office as your password
Data breaches due to stolen laptops are a major problem. Solutions exist to secure sensitive files on laptops, but are rarely deployed because users view them as inconvenient. Thi...
Ahren Studer, Adrian Perrig
« Prev « First page 2168 / 2318 Last » Next »