Sciweavers

705 search results - page 106 / 141
» Proximity Cluster Trees
Sort
View
121
Voted
DAS
2010
Springer
15 years 3 months ago
Handwritten Arabic text line segmentation using affinity propagation
In this paper, we present a novel graph-based method for extracting handwritten text lines in monochromatic Arabic document images. Our approach consists of two steps Coarse text ...
Jayant Kumar, Wael Abd-Almageed, Le Kang, David S....
92
Voted
CSCW
2008
ACM
15 years 2 months ago
Range: exploring implicit interaction through electronic whiteboard design
An important challenge in designing ubiquitous computing experiences is negotiating transitions between explicit and implicit interaction, such as how and when to provide users wi...
Wendy Ju, Brian A. Lee, Scott R. Klemmer
100
Voted
BMCBI
2010
144views more  BMCBI 2010»
15 years 18 days ago
Finding sRNA generative locales from high-throughput sequencing data with NiBLS
Background: Next-generation sequencing technologies allow researchers to obtain millions of sequence reads in a single experiment. One important use of the technology is the seque...
Daniel MacLean, Vincent Moulton, David J. Studholm...
116
Voted
BMCBI
2008
135views more  BMCBI 2008»
15 years 18 days ago
Functional site prediction selects correct protein models
Background: The prediction of protein structure can be facilitated by the use of constraints based on a knowledge of functional sites. Without this information it is still possibl...
Vijayalakshmi Chelliah, William R. Taylor
84
Voted
CORR
2008
Springer
107views Education» more  CORR 2008»
15 years 17 days ago
Our Brothers' Keepers: Secure Routing with High Performance
The Trinity [1] spam classification system is based on a distributed hash table that is implemented using a structured peer-to-peer overlay. Such an overlay must be capable of proc...
Alex Brodsky, Scott Lindenberg