Sciweavers

1053 search results - page 210 / 211
» On k-Path Covers and their applications
Sort
View
BMCBI
2004
144views more  BMCBI 2004»
13 years 6 months ago
PASBio: predicate-argument structures for event extraction in molecular biology
Background: The exploitation of information extraction (IE), a technology aiming to provide instances of structured representations from free-form text, has been rapidly growing w...
Tuangthong Wattarujeekrit, Parantu K. Shah, Nigel ...
CORR
2004
Springer
196views Education» more  CORR 2004»
13 years 6 months ago
Swarming around Shellfish Larvae
: The collection of wild larvae seed as a source of raw material is a major sub industry of shellfish aquaculture. To predict when, where and in what quantities wild seed will be a...
Vitorino Ramos, Jonathan Campbell, John Slater, Jo...
VTC
2010
IEEE
195views Communications» more  VTC 2010»
13 years 4 months ago
Efficiency of Distributed Compression and Its Dependence on Sensor Node Deployments
Abstract--In this paper we analyze the energy-efficiency of distributed compression and its dependence on the node deployment strategies for Wireless Sensor Networks (WSNs). Reduce...
Frank Oldewurtel, Janne Riihijärvi, Petri M&a...
BMCBI
2010
193views more  BMCBI 2010»
13 years 1 months ago
Mayday - integrative analytics for expression data
Background: DNA Microarrays have become the standard method for large scale analyses of gene expression and epigenomics. The increasing complexity and inherent noisiness of the ge...
Florian Battke, Stephan Symons, Kay Nieselt
GIS
2006
ACM
13 years 6 months ago
A peer-to-peer spatial cloaking algorithm for anonymous location-based service
This paper tackles a major privacy threat in current location-based services where users have to report their exact locations to the database server in order to obtain their desir...
Chi-Yin Chow, Mohamed F. Mokbel, Xuan Liu