Sciweavers

692 search results - page 121 / 139
» Publishing and Distributing
Sort
View
CGO
2006
IEEE
15 years 3 months ago
BIRD: Binary Interpretation using Runtime Disassembly
The majority of security vulnerabilities published in the literature are due to software bugs. Many researchers have developed program transformation and analysis techniques to au...
Susanta Nanda, Wei Li, Lap-Chung Lam, Tzi-cker Chi...
ICRA
2006
IEEE
110views Robotics» more  ICRA 2006»
15 years 3 months ago
Speeding-up Rao-blackwellized SLAM
— Recently, Rao-Blackwellized particle filters have become a popular tool to solve the simultaneous localization and mapping problem. This technique applies a particle filter i...
Giorgio Grisetti, Gian Diego Tipaldi, Cyrill Stach...
MIR
2006
ACM
172views Multimedia» more  MIR 2006»
15 years 3 months ago
Combining audio-based similarity with web-based data to accelerate automatic music playlist generation
We present a technique for combining audio signal-based music similarity with web-based musical artist similarity to accelerate the task of automatic playlist generation. We demon...
Peter Knees, Tim Pohle, Markus Schedl, Gerhard Wid...
SAC
2006
ACM
15 years 3 months ago
Mining and analyzing the topological structure of protein-protein interaction networks
We report a comprehensive evaluation of the topological structure of protein-protein interaction (PPI) networks by mining and analyzing graphs constructed from the publicly availa...
Daniel Duanqing Wu, Xiaohua Hu
59
Voted
CSB
2005
IEEE
135views Bioinformatics» more  CSB 2005»
15 years 3 months ago
Relating transcription factors, modules of genes and cultivation conditions in Saccharomyces cerevisiae
Usually, the functionality of a module of co-expressed genes is derived from enrichment within the module of a particular gene annotation category. The systematic setup of the che...
Theo A. Knijnenburg, Marcel J. T. Reinders, J. M. ...