Sciweavers

1050 search results - page 174 / 210
» Two methods of authenticated positioning
Sort
View
BMCBI
2007
105views more  BMCBI 2007»
15 years 1 months ago
Finding regulatory elements and regulatory motifs: a general probabilistic framework
Over the last two decades a large number of algorithms has been developed for regulatory motif finding. Here we show how many of these algorithms, especially those that model bind...
Erik van Nimwegen
JCP
2006
151views more  JCP 2006»
15 years 1 months ago
Simulated Annealing based Wireless Sensor Network Localization
In this paper, we describe a novel localization algorithm for ad hoc wireless sensor networks. Accurate selforganization and localization capability is a highly desirable character...
Anushiya A. Kannan, Guoqiang Mao, Branka Vucetic
KES
2008
Springer
15 years 1 months ago
Classification and Retrieval through Semantic Kernels
Abstract. This work proposes a family of language-independent semantic kernel functions defined for individuals in an ontology. This allows exploiting wellfounded kernel methods fo...
Claudia d'Amato, Nicola Fanizzi, Floriana Esposito
BIOINFORMATICS
2010
108views more  BIOINFORMATICS 2010»
15 years 1 days ago
Mass spectrometry data processing using zero-crossing lines in multi-scale of Gaussian derivative wavelet
Motivation: Peaks are the key information in Mass Spectrometry (MS) which has been increasingly used to discover diseases related proteomic patterns. Peak detection is an essentia...
Nha Nguyen, Heng Huang, Soontorn Oraintara, An P. ...
EDM
2009
116views Data Mining» more  EDM 2009»
14 years 11 months ago
Determining the Significance of Item Order In Randomized Problem Sets
Researchers who make tutoring systems would like to know which sequences of educational content lead to the most effective learning by their students. The majority of data collecte...
Zachary A. Pardos, Neil T. Heffernan