Sciweavers

3898 search results - page 688 / 780
» Maintaining Component-Based Systems
Sort
View
142
Voted
CLEF
2010
Springer
15 years 4 months ago
Experiences at ImageCLEF 2010 using CBIR and TBIR Mixing Information Approaches
The main goal of this paper it is to present our experiments in ImageCLEF 2010 Campaign (Wikipedia retrieval task). This edition we present a different way of using textual and vis...
Joan Benavent, Xaro Benavent, Esther de Ves, Ruben...
114
Voted
DOCENG
2010
ACM
15 years 4 months ago
APEX: automated policy enforcement eXchange
: APEX: Automated Policy Enforcement eXchange Steven J. Simske, Helen Balinsky HP Laboratories HPL-2010-134 Policy, Text Analysis, Policy Server, Policy Editor, Document Systems, ...
Steven J. Simske, Helen Balinsky
148
Voted
BMCBI
2010
191views more  BMCBI 2010»
15 years 3 months ago
BiGG: a Biochemical Genetic and Genomic knowledgebase of large scale metabolic reconstructions
Background: Genome-scale metabolic reconstructions under the Constraint Based Reconstruction and Analysis (COBRA) framework are valuable tools for analyzing the metabolic capabili...
Jan Schellenberger, Junyoung O. Park, Tom M. Conra...
129
Voted
BMCBI
2007
124views more  BMCBI 2007»
15 years 3 months ago
BioInfer: a corpus for information extraction in the biomedical domain
Background: Lately, there has been a great interest in the application of information extraction methods to the biomedical domain, in particular, to the extraction of relationship...
Sampo Pyysalo, Filip Ginter, Juho Heimonen, Jari B...
124
Voted
CL
2010
Springer
15 years 3 months ago
Isolating untrusted software extensions by custom scoping rules
In a modern programming language, scoping rules determine the visibility of names in various regions of a program [15]. In this work, we examine the idea of allowing an applicatio...
Philip W. L. Fong, Simon A. Orr