Sciweavers

5722 search results - page 1016 / 1145
» Security Function Interactions
Sort
View
NAR
2006
134views more  NAR 2006»
15 years 3 months ago
The MPI Bioinformatics Toolkit for protein sequence analysis
The MPI Bioinformatics Toolkit is an interactive web service which offers access to a great variety of public and in-house bioinformatics tools. They are grouped into different se...
Andreas Biegert, Christian Mayer, Michael Remmert,...
143
Voted
PAMI
2006
181views more  PAMI 2006»
15 years 3 months ago
Optimal Surface Segmentation in Volumetric Images-A Graph-Theoretic Approach
Efficient segmentation of globally optimal surfaces representing object boundaries in volumetric data sets is important and challenging in many medical image analysis applications....
Kang Li, Xiaodong Wu, Danny Z. Chen, Milan Sonka
IJAR
2007
130views more  IJAR 2007»
15 years 3 months ago
Bayesian network learning algorithms using structural restrictions
The use of several types of structural restrictions within algorithms for learning Bayesian networks is considered. These restrictions may codify expert knowledge in a given domai...
Luis M. de Campos, Javier Gomez Castellano
IJRR
2007
181views more  IJRR 2007»
15 years 3 months ago
Optimal Rough Terrain Trajectory Generation for Wheeled Mobile Robots
An algorithm is presented for wheeled mobile robot trajectory generation that achieves a high degree of generality and efficiency. The generality derives from numerical lineariza...
Thomas M. Howard, Alonzo Kelly
IOR
2007
119views more  IOR 2007»
15 years 3 months ago
A Decentralized Approach to Discrete Optimization via Simulation: Application to Network Flow
We study a new class of decentralized algorithms for discrete optimization via simulation, which is inspired by the fictitious play algorithm applied to games with identical inte...
Alfredo Garcia, Stephen D. Patek, Kaushik Sinha
« Prev « First page 1016 / 1145 Last » Next »