Sciweavers

5575 search results - page 1071 / 1115
» Information Extraction
Sort
View
FOIS
2006
15 years 16 days ago
Modular Ontology Design Using Canonical Building Blocks in the Biochemistry Domain
The field of BioInformatics has become a major venue for the development and application of computational ontologies. Ranging from controlled vocabularies to annotation of experim...
Christopher J. Thomas, Amit P. Sheth, William S. Y...
ISBI
2007
IEEE
15 years 5 months ago
Validation of Optical-Flow for Quantification of Myocardial Deformations on Simulated Rt3d Ultrasound
Quantitative analysis of cardiac motion is of great clinical interest in assessing ventricular function. Real-time 3-D (RT3D) ultrasound transducers provide valuable fourdimension...
Qi Duan, Elsa D. Angelini, Shunichi Homma, Andrew ...
CCS
2008
ACM
15 years 1 months ago
Securing group key exchange against strong corruptions
When users run a group key exchange (GKE) protocol, they usually extract the key from some auxiliary (ephemeral) secret information generated during the execution. Strong corrupti...
Emmanuel Bresson, Mark Manulis
KDD
2008
ACM
181views Data Mining» more  KDD 2008»
15 years 11 months ago
Learning subspace kernels for classification
Kernel methods have been applied successfully in many data mining tasks. Subspace kernel learning was recently proposed to discover an effective low-dimensional subspace of a kern...
Jianhui Chen, Shuiwang Ji, Betul Ceran, Qi Li, Min...
CMS
2010
150views Communications» more  CMS 2010»
14 years 11 months ago
Throwing a MonkeyWrench into Web Attackers Plans
Abstract. Client-based attacks on internet users with malicious web pages represent a serious and rising threat. Internet Browsers with enabled active content technologies such as ...
Armin Büscher, Michael Meier, Ralf Benzmü...
« Prev « First page 1071 / 1115 Last » Next »