Sciweavers

8647 search results - page 1568 / 1730
» The Container Selection Problem
Sort
View
105
Voted
WABI
2007
Springer
15 years 9 months ago
Shotgun Protein Sequencing
Although snake venom proteins have been proven instrumental in the design of blood clotting and cytostatic breast cancer drugs, the main method in use to sequence these unknown pr...
Pavel A. Pevzner
GMP
2006
IEEE
127views Solid Modeling» more  GMP 2006»
15 years 9 months ago
Finding All Undercut-Free Parting Directions for Extrusions
For molding and casting processes, geometries that have undercut-free parting directions (UFPDs) are preferred for manufacturing. Identifying all UFPDs for arbitrary geometries at ...
Xiaorui Chen, Sara McMains
SP
2006
IEEE
132views Security Privacy» more  SP 2006»
15 years 9 months ago
Towards Automatic Generation of Vulnerability-Based Signatures
In this paper we explore the problem of creating vulnerability signatures. A vulnerability signature matches all exploits of a given vulnerability, even polymorphic or metamorphic...
David Brumley, James Newsome, Dawn Xiaodong Song, ...
GRAPHITE
2006
ACM
15 years 9 months ago
Inverse tone mapping
In recent years many tone mapping operators (TMOs) have been presented in order to display high dynamic range images (HDRI) on typical display devices. TMOs compress the luminance ...
Francesco Banterle, Patrick Ledda, Kurt Debattista...
JCDL
2006
ACM
161views Education» more  JCDL 2006»
15 years 9 months ago
Learning metadata from the evidence in an on-line citation matching scheme
Citation matching, or the automatic grouping of bibliographic references that refer to the same document, is a data management problem faced by automatic digital libraries for sci...
Isaac G. Councill, Huajing Li, Ziming Zhuang, Sand...
« Prev « First page 1568 / 1730 Last » Next »