Sciweavers

1050 search results - page 155 / 210
» Two methods of authenticated positioning
Sort
View
107
Voted
TOSEM
1998
80views more  TOSEM 1998»
15 years 1 months ago
Discovering Models of Software Processes from Event-Based Data
Many software process methods and tools presuppose the existence of a formal model of a process. Unfortunately, developing a formal model for an on-going, complex process can be d...
Jonathan E. Cook, Alexander L. Wolf
137
Voted
RECOMB
1999
Springer
15 years 6 months ago
Fast detection of common geometric substructure in proteins
We consider the problem of identifying common three-dimensional substructures between proteins. Our method is based on comparing the shape of the α-carbon backbone structures of ...
L. Paul Chew, Daniel P. Huttenlocher, Klara Kedem,...
BMCBI
2006
98views more  BMCBI 2006»
15 years 1 months ago
Optimised amino acid specific weighting factors for unbound protein docking
Background: One of the most challenging aspects of protein-protein docking is the inclusion of flexibility into the docking procedure. We developed a postfilter where the grid-rep...
Philipp Heuser, Dietmar Schomburg
FUIN
2006
98views more  FUIN 2006»
15 years 1 months ago
On-line Approximate String Matching in Natural Language
We consider approximate pattern matching in natural language text. We use the words of the text as the alphabet, instead of the characters as in traditional string matching approac...
Kimmo Fredriksson
181
Voted
CVPR
2009
IEEE
16 years 9 months ago
Joint and Implicit Registration for Face Recognition
Contemporary face recognition algorithms rely on precise localization of keypoints (corner of eye, nose etc.). Unfortunately, finding keypoints reliably and accurately remains a...
Peng Li, Simon J. D. Prince