Sciweavers

415 search results - page 61 / 83
» Intruders pattern identification
Sort
View
RPTEL
2006
75views more  RPTEL 2006»
14 years 9 months ago
A Qualitative Analysis of Collaborative Knowledge Construction through Shared Representations
This paper takes one step towards addressing the question of how activity mediated by shared representations--notations that are manipulated by more than one person during a collab...
Daniel D. Suthers
BMCBI
2005
115views more  BMCBI 2005»
14 years 9 months ago
Graphical representation of ribosomal RNA probe accessibility data using ARB software package
Background: Taxon specific hybridization probes in combination with a variety of commonly used hybridization formats nowadays are standard tools in microbial identification. A fre...
Yadhu Kumar, Ralf Westram, Sebastian Behrens, Bern...
BMCBI
2005
121views more  BMCBI 2005»
14 years 9 months ago
Quality control and quality assessment of data from surface-enhanced laser desorption/ionization (SELDI) time-of flight (TOF) ma
Background: Proteomic profiling of complex biological mixtures by the ProteinChip technology of surfaceenhanced laser desorption/ionization time-of-flight (SELDI-TOF) mass spectro...
Huixiao Hong, Yvonne P. Dragan, Joshua Epstein, Ca...
PAMI
2007
157views more  PAMI 2007»
14 years 9 months ago
Pores and Ridges: High-Resolution Fingerprint Matching Using Level 3 Features
—Fingerprint friction ridge details are generally described in a hierarchical order at three different levels, namely, Level 1 (pattern), Level 2 (minutia points), and Level 3 (p...
Anil K. Jain, Yi Chen, Meltem Demirkus
JAPLL
2010
98views more  JAPLL 2010»
14 years 8 months ago
Formalization of the ad hominem argumentation scheme
In this paper, several examples from the literature, and one central new one, are used as case studies of texts of discourse containing an argumentation scheme that has now been w...
Douglas Walton