Sciweavers

772 search results - page 142 / 155
» Network Intrusion Detection Using Genetic Clustering
Sort
View
AINA
2008
IEEE
15 years 4 months ago
Associating Faces and Names in Japanese Photo News Articles on the Web
We propose a system which extracts faces and person names from news articles with photos on the Web and associates them automatically. The system detects face images in news photo...
Akio Kitahara, Taichi Joutou, Keiji Yanai
ASWC
2009
Springer
14 years 10 months ago
Semantic Rules on Drug Discovery Data
Aggregating and presenting a wide variety of information pertinent to the biological and pharmacological effects of chemical compounds will be a critical part of 21st century drug ...
Sashikiran Challa, David J. Wild, Ying Ding, Qian ...
MOBIHOC
2010
ACM
14 years 7 months ago
Barrier coverage with sensors of limited mobility
Barrier coverage is a critical issue in wireless sensor networks for various battlefield and homeland security applications. The goal is to effectively detect intruders that attem...
Anwar Saipulla, Benyuan Liu, Guoliang Xing, Xinwen...
BMCBI
2004
174views more  BMCBI 2004»
14 years 9 months ago
Implications for domain fusion protein-protein interactions based on structural information
Background: Several in silico methods exist that were developed to predict protein interactions from the copious amount of genomic and proteomic data. One of these methods is Doma...
Jer-Ming Chia, Prasanna R. Kolatkar
NOSSDAV
2009
Springer
15 years 4 months ago
Overlay monitoring and repair in swarm-based peer-to-peer streaming
In Swarm-based Peer-to-Peer Streaming (SPS) mechanisms, participating peers form a randomly connected mesh over which they incorporate swarm-like content delivery. In practice, a ...
Nazanin Magharei, Reza Rejaie