Sciweavers

1759 search results - page 298 / 352
» Using term informativeness for named entity detection
Sort
View
ICIP
2001
IEEE
15 years 11 months ago
Adaptive motion search with elastic diamond for MPEG-4 video coding
Video coding is a complex process, comprising a combination of spatial, temporal and statistical data reduction techniques. Of these techniques, motion estimation taking advantage...
Weiguo Zheng, Ishfaq Ahmad, Ming Lei Liou
BMCBI
2010
136views more  BMCBI 2010»
14 years 10 months ago
Protein structure analysis of mutations causing inheritable diseases. An e-Science approach with life scientist friendly interfa
Background: Many newly detected point mutations are located in protein-coding regions of the human genome. Knowledge of their effects on the protein's 3D structure provides i...
Hanka Venselaar, Tim A. H. te Beek, Remko K. P. Ku...
WS
2005
ACM
15 years 3 months ago
Hotspot-based traceback for mobile ad hoc networks
Traceback schemes are useful to identify the source of an attack. Existing traceback systems are not suitable for Mobile Ad Hoc Networks (MANET) because they rely on assumptions s...
Yi-an Huang, Wenke Lee
WWW
2010
ACM
15 years 2 months ago
FormSys: form-processing web services
In this paper we present FormSys, a Web-based system that service-enables form documents. It offers two main services: filling in forms based on Web services’ incoming SOAP me...
Ingo M. Weber, Hye-Young Paik, Boualem Benatallah,...
CCS
2006
ACM
15 years 1 months ago
A scalable approach to attack graph generation
Attack graphs are important tools for analyzing security vulnerabilities in enterprise networks. Previous work on attack graphs has not provided an account of the scalability of t...
Xinming Ou, Wayne F. Boyer, Miles A. McQueen