Home

About

Advanced Search

Browse by Discipline

Scientific Societies

E-print Alerts

Add E-prints

E-print Network
FAQHELPSITE MAPCONTACT US


  Topic List  Advanced Search  
Sample search results for: abacas algorithm-based automatic

Page:   2  3  4  5 
 
1 INTEX: A CORPUS PROCI!]SSIN(-?, SYSTEM Max I). Silberztein
 

Summary:  , but can also be viewed as an information feb'lewd system. INTROI)UCTION INTEX automatically identities... )EI,AI::: a, avoil: V'.P3s abacas, abaca. N:mp abais.va, abaisses: g.',lXs The token 'a' is the Verb 'avoir... ' con,jugaled in tilt Third Person Singular l'resent (P3s); 'abacas' is the masculine plural ...

  

Source: Association for Computational Linguistics (ACL) Anthology

 

Collection: Computer Technologies and Information Sciences

 
2 An Introduction to logWeaver (v2.8) Jean GoubaultLarrecq 1;2
 

Summary:  administrator we would like to be warned---automatically, if possible---only when the same user does both... in the distribution) : Feb 9 16:54:11 abaca PAM_pwdb[2732]: authentication failure; (uid=500) ­> root for su service... , automatically converts strings, integers, and dates as needed. Finally, observe that we have ...

  

Source: Ecoles Normales Supérieures de Cachan, Laboratoire Spécification et Vérification

 

Collection: Computer Technologies and Information Sciences

 
3 An Introduction to log eaver (v2.8)
 

Summary:  administrator we would like to be warned--automatically, if possible--only when the same user does both. Reports... the following (see the messages.4 file in the distribution) : Feb 9 16:54:11 abaca PAM_pwdb[2732... to use it as an integer. log eaver, like Perl, automatically converts strings, integers, and dates

  

Source: Ecoles Normales Supérieures de Cachan, Laboratoire Spécification et Vérification

 

Collection: Computer Technologies and Information Sciences

 
4 CloG: a pipeline for closing gaps in a draft assembly using short reads Xing Yang, Daniel Medvin, Giri Narasimhan
 

Summary:  . 1(1). [3] Assefa, S., T.M. Keane, T.D. Otto, C. Newbold, and M. Berriman, ABACAS: algorithm-based... ], Dupfinisher [6], and ABACAS [3] have been developed to facilitate PCR primer design and to assist in finishing... automatic contiguation of assembled sequences. Bioinformatics, 2009. 25(15): p. 1968-9. [4] ...

  

Source: Narasimhan, Giri - School of Computer Science, Florida International University

 

Collection: Computer Technologies and Information Sciences

 
5 Dependency-based Sentence Alignment for Multiple Document Summarization
 

Summary:  .kecl.ntt.co.jp Abstract In this paper, we describe a method of automatic sentence alignment for building extracts from ab... - stracts in automatic summarization research. Our method is based on two steps. First, we introduce... performance. 1 Introduction Many researchers who study automatic summariza- tion want to create ...

  

Source: Association for Computational Linguistics (ACL) Anthology

 

Collection: Computer Technologies and Information Sciences

 
6 Book Editors IOS Press, 2003
 

Summary:  such as Natural Language Processing or Information Retrieval to automatically learn taxonomies from data. As text... for a correspondingtaxonomic relation isaABACA (F ¦ ,F ¨ ). So, this source of evidence is certainly similar in spirit... ; the value in the second column indicates the normalized number of hits returned by the Google API: ...

  

Source: Staab, Steffen - Institut für Informatik, Universität Koblenz-Landau

 

Collection: Computer Technologies and Information Sciences

 
7 The Journal of Natural Fibers has a 2010 Impact Factor of .393!
 

Summary:  -460. R.B. Armecin, Nutrient Composition of Abaca (Musa textilis Nee) at Seedling, Vegetative

  

Source: Grant, James D.E. - Fakultät für Mathematik, Universität Wien

 

Collection: Mathematics

 
8 The University of Arizona Museum of Art presents: Jackie Battenfield: Moments of Change
 

Summary:  on handmade abaca paper with pigmented linen pulp painting.Collection of the artist © Jackie Battenfield

  

Source: Wong, Pak Kin - Department of Aerospace and Mechanical Engineering, University of Arizona

 

Collection: Engineering ; Biology and Medicine

 
9 MS2a, Exercises Week 6 Rune Lyngs
 

Summary:  of ABACA, but ABA, ACA would not. c. How could you systematically determine the fewest palindromes a string

  

Source: Goldschmidt, Christina - Department of Statistics, University of Warwick

 

Collection: Mathematics

 
10 Fundamenta Informaticae XX (2008) 132 1 Synthesis of Petri Nets from Finite Partial Languages
 

Summary:  the synthesis algorithm based on token flow regions. In Subsection 3.1 we recall definitions and main results... by the set of LPOs. a b c a a a(b+c)aa acaba acbaa abcaa abaca a(b+c)aa acaba acbaa abcaa abaca a... (b+c)(a+a) acb(a+a) abc(a+a) ac(a+b)a ab(a+c)a a(b+c)(a+a) acb(a+a) ...

  

Source: Six, Hans-Werner - Fakultät für Mathematik und Informatik, FernUniversität in Hagen

 

Collection: Computer Technologies and Information Sciences

 
11 Comparison of Different Algorithms to Synthesize a Petri Net from a Partial Language
 

Summary:  by feasible places. In the original algorithm based on Definition 6 we try to calculate a region for each step... regions of languages of step sequences [11]. a b c a a a(b+c)aa acaba acbaa abcaa abaca a(b+c)aa acaba... acbaa abcaa abaca a(b+c)(a+a) acb(a+a) abc(a+a) ac(a+b)a ab(a+c)a ...

  

Source: Six, Hans-Werner - Fakultät für Mathematik und Informatik, FernUniversität in Hagen

 

Collection: Computer Technologies and Information Sciences

 
12 Universidad Simn Bolvar Depto. de Computacin y Tecnologa de la Informacin
 

Summary:  Castellano y C. (7 puntos) 2) Corra paso a paso su algoritmo para la instancia: cbbaxa abaca (4 puntos) k li

  

Source: Meza, Oscar J. - Departamento de Computación y Tecnología de la Información, Universidad Simón Bolívar

 

Collection: Computer Technologies and Information Sciences

 
13 If you do not have a visa that is eligible for employment, then you
 

Summary:  and directions. Use zip code 38104 for your search. http://s3abaca.ssa.gov/pro/fol/fol-form.cgi OR, you may catch... this website for map and phone numbers and directions. Use zip code 38117 for your search. http://s3abaca

  

Source: Dasgupta, Dipankar - Computer Science Division, Department of Mathematical Sciences, University of Memphis

 

Collection: Computer Technologies and Information Sciences

 
14 BAHAMA ISLANDS Christian JUBERTHIE* and Thomas M. ILIFFE**
 

Summary:  Providence, Eleuthera, Long, and Cat, and the Little Bahama Bank, to the north, with Grand Bahama and Abaca... on Grand Bahama Island and Speleonectes lucayensis in Andros Island (YAGER 1981a, 1989). Dan's Cave (Abaca... and Abaca (HOLSINGER and YAGER, 1985). HOLSINGER et al. (1986) suggests that Bahadzia is an ancient relict

  

Source: Iliffe, Thomas M. - Department of Marine Biology, Texas A&M University at Galveston

 

Collection: Environmental Sciences and Ecology

 
15 Author's personal copy Prioritizing areas for conservation and vegetation restoration
 

Summary:  an algorithm based on rarity and complementarity to prioritize sites on Bioko to represent a tar- geted... occurring in this strip comprise lowland rainforest and abandoned plantations of cocoa, oil palm, and abaca... . Except for the abaca areas (which are still heavily occupied by Musa textilis plants) the ...

  

Source: Rodríguez, Miguel Ángel - Departamento de Ecología, Universidad de Alcala

 

Collection: Environmental Sciences and Ecology

 
16 Journal of Automata, Languages and Combinatorics u (v) w, xy Otto-von-Guericke-Universitat Magdeburg
 

Summary:  UyWP§z©A§rU{§ sw| 5 Y § Y}| abaca | 5 v§ v `5 yS~ha A set qrdS f is semilinear if it is a finite union of linear... and ¡ s `bacabad`¡Â , we have ¡Ux¡ s ¥ abacae¥ ¡Â6Ux£ . From above, a P system 4 can be treated as a transition... from a configuration in Õm gEy¤ Y ` abacaC`tm g£y R f Ö. Hence, if v is or ...

  

Source: Dang, Zhe - School of Electrical Engineering and Computer Science, Washington State University

 

Collection: Computer Technologies and Information Sciences

 
17 Satis ability of Systems of Equations over Finite Cristopher Moore 1 , Pascal Tesson 2 , and Denis Th erien 2?
 

Summary:  ; it satis#12;es m 2 = m for all m 2 M and abaca = abca for all a; b; c 2 M (See e.g. [4]). Theorem 6. If M... abaca = abca to get KmK = Kx 1 #1; #1; #1; x k K = K 2 = K. Thus, m #21;J K and so mJK. Note also... that K #21;R m. Indeed, we have Km = Kmx 1 : : : x k y 1 : : : y l . Using again the relation abaca

  

Source: Therien, Denis - School of Computer Science, McGill University

 

Collection: Computer Technologies and Information Sciences

 
18 Machine-Readable Dictionaries in Text-to-Speech Judith L. Klavans~and Evclyne Tzoukcrmann *
 

Summary:  with research on the automatic use of MR.D data; the other are TTS system designers who require linguistic... are not straighforward to perform automatically. 2.1 Using the MRD pronunciation field Extracting the prommciation field... to extract automatically. For example, in (5) and (6), one needs to know the nature of the rule ...

  

Source: Association for Computational Linguistics (ACL) Anthology

 

Collection: Computer Technologies and Information Sciences

 
19 OctobreTravaux du Museum National d 'Histoire Naturelle 2009Grigore Antipa
 

Summary:  of the Bahamas (Andros, Exumas and Abaca). Three species are from Bodotriidae: Cyclaspis goesi (Sars, 1871), C... by junior author of the paper, Dr. Thomas M. Iliffe from ocean blue holes (submarine caves) on Abaca... to science, from family Nannastacidae. #12;128 IORGU PETRESCU, THOMAS M. ILIFFE rida ~~ Abaca Grand Bahama 6

  

Source: Iliffe, Thomas M. - Department of Marine Biology, Texas A&M University at Galveston

 

Collection: Environmental Sciences and Ecology

 
20 Efficient Synchronization for Mobile XML Data Franky Lam Nicole Lam Raymond Wong
 

Summary:  ]. With the exception of [5], the works above did not attempt to reduce costs by automatically merging similar queries... shown in Figure 2b. 7 /a/b/a/c/a 14 /a/b/a 4 /a/*/d 8 /e/f/g /a/b 13 /a/c 5 /a//a 11 /a//b 3 /b/a 1 //a... 3 4 5 6 7 8 9 10 11 12 13 14 15 16 1 //a//b //a /b/a /a/*/d /a//a /b /a/b/a/c/a /e/f/g /a/b / /a

  

Source: Madiraju, Praveen - Department of Mathematics, Statistics and Computer Science, Marquette University

 

Collection: Mathematics ; Computer Technologies and Information Sciences


Page:   2  3  4  5 
Page:   1  2  3  4  5 
 
21 PRECISE ESTIMATION ON THE ORDER OF LOCAL TESTABILITY OF DETERMINISTIC
 

Summary:  , whence abaca 6= acaba. So we may suppose that sab1e ~ qab1e and qab1e 2 X. The nodes qab1e and sab1e... it follows that sacaba 6= sabaca and abaca 6= acaba. The lemma is proved. Lemma 36 Suppose... S such that for a = a1...ak 1 we have abaca 6= acaba (See (3)). Let a1, ..., ak 1 denote the edges of the considered

  

Source: Trakhtman, Avraham - Department of Mathematics, Bar Ilan University

 

Collection: Mathematics

 
22 Symbiotic Evolutional Models in Multiagent Systems Toru Eguchi, Kotaro Hirasawa and Jinglu Hu
 

Summary:  in cases of Mutualism, Competition, Predation and Altruism. In Fig.3, the symbols of A,B,C,ABACA show... /processing is done and moves to the next node automatically, because the processing node has only one branch. GNP has

  

Source: Coello, Carlos A. Coello - Laboratorio Nacional de Informatica Avanzada (LANIA)

 

Collection: Computer Technologies and Information Sciences

 
23 tto Gottlieb costumava falar pouco e baixo. Podia passar despercebido em festas de ca-
 

Summary:  cerca de 400 espécies no país ­ como o abaca- te e o louro ­, enquanto a segunda possui 60 ­ um exemplo

  

Source: Lucero, Jorge Carlos - Departamento de Matemática, Universidade de Brasília

 

Collection: Mathematics

 
24 Informatique --Info 803 Master IDESSE / IM Examen final
 

Summary:  abaca, mais ce n'est pas la plus longue car il y a aussi aca ou aba. Question 1. Est-ce que le nombre de

  

Source: Bucur, Dorin - Laboratoire de Mathématiques, Université de Savoie

 

Collection: Mathematics

 
25 OBSTRUCTIONS ON FUNDAMENTAL GROUPS OF PLANE CURVE COMPLEMENTS
 

Summary:  -chains of the universal cover of U. First, the 2-chain of U corresponding to the relation abaca-1 c-1 a-1... - abaca-1 - abaca-1 c-1 -abaca-1 c-1 a-1 - abaca-1 c-1 a-1 b-1 Using the relation abaca-1 c-1 a-1... is the following: (aba-1 - baca-1 )t + (1 - b) ...

  

Source: Leidy, Constance - Department of Mathematics and Computer Science, Wesleyan University

 

Collection: Mathematics

 
26 Contemporary Mathematics Obstructions on Fundamental Groups
 

Summary:  . First, the 2-chain of U corresponding to the relation abaca-1 c-1 a-1 b-1 in 1(U) lifts to a 2-chain... of the universal cover of U whose boundary is: + a + ab + aba - abaca-1 - abaca-1 c-1 -abaca-1 c-1 a-1... - abaca-1 c-1 a-1 b-1 #12;FUNDAMENTAL GROUPS OF CURVE ...

  

Source: Maxim, Laurentiu-George - Department of Mathematics, University of Wisconsin at Madison

 

Collection: Mathematics

 
27 Update Synchronization for Mobile XML Data Franky Lam Nicole Lam Raymond Wong
 

Summary:  not attempt to reduce costs by automatically merging similar queries. Finally, an extensive survey on recent... /a/b/a/c/a 14 /a/b/a 4 /a/*/d 8 /e/f/g /a/b 13 /a/c 5 /a//a 11 /a//b 3 /b/a 1 //a//b 9 /* 15 /a 6 /b... 11 12 13 14 15 16 1 //a//b //a /b/a /a/*/d /a//a /b /a/b/a/c/a /e/f/g /a/b / /a//b /* /a/c /a/b/a /a

  

Source: New South Wales, University of - School of Computer Science and Engineering

 

Collection: Computer Technologies and Information Sciences

 
28 OPTIMAL ESTIMATION ON THE ORDER OF LOCAL TESTABILITY OF FINITE
 

Summary:  sacaba = qaba does not belong to X either. From qa 2 X we have qa = sabaca 6= sacaba = qaba, whence abaca... that sacaba 6= sabaca and abaca 6= acaba. 2 Lemma 1.6 Suppose that in the 2-tuple graph of an LDFA... -validity of the identity fi we must find elements a1, ...ak-1 , b, c 2 S such that for a = a1...ak-1 we have ...

  

Source: Trakhtman, Avraham - Department of Mathematics, Bar Ilan University

 

Collection: Mathematics

 
29 PRECISE ESTIMATION ON THE ORDER OF LOCAL TESTABILITY OF DETERMINISTIC
 

Summary:  2 X we have qa = sabaca 6= sacaba = qaba, whence abaca 6= acaba. So we may suppose that sab 1 e... sacaba = qaba = sa. Now from sabaca = saca =qa and qa 6= sa it follows that sacaba 6= sabaca and abaca 6... , c 2 S such that for a = a 1 :::a k\Gamma1 we have abaca 6= acaba (See (3)). Let a 1 ; :::; a k

  

Source: Trakhtman, Avraham - Department of Mathematics, Bar Ilan University

 

Collection: Mathematics

 
30 OPTIMAL ESTIMATION ON THE ORDER OF LOCAL TESTABILITY OF FINITE
 

Summary:  , whence abaca 6= acaba. So we may suppose that sab 1 e ¸ qab 1 e and qab 1 e 2 X. The nodes qab 1 e... and qa 6= sa it follows that sacaba 6= sabaca and abaca 6= acaba. 2 Lemma 1.6 Suppose that in the 2­tuple... abaca 6= acaba (See (3)). Let a 1 ; :::a k\Gamma1 denote the edges of the considered path (p 1 ; q 1

  

Source: Trakhtman, Avraham - Department of Mathematics, Bar Ilan University

 

Collection: Mathematics

 
31 Simulation of Borehole Resistivity Tools Through Metal Casing at Different Frequencies Using a Goal
 

Summary:  -oriented hp-adaptivity, we propose the following algorithms based on estimate (40): Find an optimal ~hp... in [13], and used in [12], [14] for the construction of the fully automatic energy- norm based hp... on the main ideas of the fully automatic (energy- norm based) hp-adaptive algorithm presented in ...

  

Source: Torres-Verdín, Carlos - Department of Petroleum and Geosystems Engineering, University of Texas at Austin

 

Collection: Fossil Fuels ; Geosciences

 
32 Selection Procedures The Editorial Team screens each issue of 60+ leading journals in the field for articles that meet
 

Summary:  alternating treatments design; alternating treatments design; ABACA/ACABA design; A-B-BC-B-BC/A-BC-B-BC design

  

Source: Grant, James D.E. - Fakultät für Mathematik, Universität Wien

 

Collection: Mathematics

 
33 MS2a, Exercises Week 6, Model Solution Rune Lyngs
 

Summary:  , e.g. ABA, C, A would be a valid split of ABACA, but ABA, ACA would not. One cover using 18

  

Source: Goldschmidt, Christina - Department of Statistics, University of Warwick

 

Collection: Mathematics

 
34 A POLYNOMIAL TIME ALGORITHM FOR LOCAL TESTABILITY AND ITS LEVEL
 

Summary:  are not distinct. Suppose now that S does not belong to [xyxzx = xzxyx]. So for some a, b, c * *of S abaca 6... -1, we have abaca 6= acaba. One of the equa* *lities abaca = abacaba, acaba = abacaba does

  

Source: Trakhtman, Avraham - Department of Mathematics, Bar Ilan University

 

Collection: Mathematics

 
35 A POLYNOMIAL TIME ALGORITHM FOR LOCAL TESTABILITY AND ITS LEVEL
 

Summary:  of S abaca 6= acaba. Since S 2 = S, Lemma 2 implies that a is divided by some idempotent e, a = peq... for some elements a, b, c, where a 2 S n\Gamma1 , we have abaca 6= acaba. One of the equalities abaca

  

Source: Trakhtman, Avraham - Department of Mathematics, Bar Ilan University

 

Collection: Mathematics

 
36 Accepted by M. Christenhusz: 30 Sep. 2010; published: 28 Oct. 2010 49 ISSN 1179-3155 (print edition)
 

Summary:  ) which is increasingly undergoing disturbance and fragmentation from clearing for abaca (Musa textilis... of the forest for abaca plantations and the harvesting of other forest products must be carefully managed... . Sabah Parks, Kota Kinabalu. Née, L. (1801) De la abaca, que es la Musa textilis. Anales de Ciencias

  

Source: Nickrent, Daniel L. - Department of Plant Biology, Southern Illinois University

 

Collection: Environmental Sciences and Ecology ; Biology and Medicine

 
37 Dichotomies in the Complexity of Solving Systems of Equations over Finite Semigroups
 

Summary:  in Figure 1 and where ab = b, ba = a and c = ca = cb. It is not a regular band, because abca = bc but abaca... abaca = abca. Lemma 20. If S is a regular band, then T­EQN # S is computable in polynomial time. 5... . On the other hand, since all x i 's appear in K, we can use the identity abaca = abca to get KsK = Kx 1 · · · x

  

Source: Therien, Denis - School of Computer Science, McGill University

 

Collection: Computer Technologies and Information Sciences

 
38 2006 The Authors. Journal compilation 2006 The Norwegian Academy of Science and Letters Zoologica Scripta, 36, 2, March 2007, pp173200 173 Balke, M., Wewalka, G., Alarie, Y., Ribera, I. (2007). Molecular phylogeny of Pacific Island
 

Summary:  & Wewalka 9.xi.2001 Rhantus annectens MB 467 Fiji:Viti Levu, Lautoka, road Abaca to coast (FI013) 200 m... Balke,Wewalka & Mailautoka 12.xi.2003 Rhantus vitiensis MB 468 Fiji:Viti Levu, Lautoka,Abaca, waterfall... , Lautoka,Abaca, waterfall (FI012) 500­700 m Balke,Wewalka & Mailautoka 11.xi.2003 Rhantus kini MB 470 ...

  

Source: Ribera, Ignacio - Institut de Biologia Evolutiva, Universitat Pompeu Fabra

 

Collection: Biology and Medicine ; Environmental Sciences and Ecology

 
39 NATO~AL LANGUAGES AND THH CROMS[Z KIERARCHT -~ndr;a Korna
 

Summary:  the 18th ~Lnou~L ~omtlnE o£ the dCL 107-111 lit,abaca, ~ 1 1974: Automate, lsnaueaes, tad m... Jal--llse LanGuages- Prate 16th S:wmF.oslus cn SeI ,chin41 lq~oo r y and Automat e 13 5-143 S el.omaa~ &o-. 1973

  

Source: Association for Computational Linguistics (ACL) Anthology

 

Collection: Computer Technologies and Information Sciences

 
40 MODIFIED PADOVAN WORDS AND THE MAXIMUM NUMBER OF RUNS IN A WORD
 

Summary:  abac p14 abaca acabacaabac abaca acabacaabac abaca p15 acabaca abacaacabacaab acabaca abacaacabacaab

  

Source: Simpson, Jamie - Department of Mathematics and Statistics, Curtin University of Technology

 

Collection: Mathematics


Page:   1  2  3  4  5 
Page:   1  2  3  4  5 
 
41 CI5651 -Dise~no de Algoritmos 1 Solucion del Examen 2
 

Summary:  algoritmo para la instancia 'cbbaxa' - > 'abaca... a paso el algoritmo para la instancia 'cbbaxa' - > 'abaca' Al ejecutar el algoritmo, la tabla 'medmem... cual corresponde a la siguiente transformaci´on: cbbaxa -> abbaxa abbaxa -> abaxa abaxa -> abaca 18 #12;

  

Source: Meza, Oscar J. - Departamento de Computación y Tecnología de la Información, Universidad Simón Bolívar

 

Collection: Computer Technologies and Information Sciences

 
42 EPISTURMIAN WORDS: A SURVEY Jacques Justin
 

Summary:  automatically from closure under reversal in the case of right-infinite words; see for instance [29] for a proof... -closure. Here m (from the above example) appears step by step on the right: a · a · ba abaca · ba abaca

  

Source: Glen, Amy - Laboratoire de combinatoire et d'informatique mathématique, Université du Québec à Montréal

 

Collection: Mathematics

 
43 Virtual Laboratories > 1. Foundations > 1 2 3 4 5 6 7 8 9 Poincar's quote, on the title page of this chapter could not be more wrong (what was he thinking?). Set
 

Summary:  (BC) = (AB)Cb. Thus, we can write ABC and ABC without ambiguity. 12. Prove the distributive laws: A(BC) = (AB)(AC)a

  

Source: Demeio, Lucio - Dipartimento di Scienze Matematiche, Università Politecnica delle Marche

 

Collection: Mathematics

 
44 Marketing Bulletin, 1990, 1, 37-42, Article 6 Page 1 of5 http://marketing-bulletin.massey.ac.nz
 

Summary:  of natural rubber, abaca, and palm oil, along with substantial exports of tin, copra, copper, sugar, coffee

  

Source: Castro, Isabel - Institute of Natural Resources, Massey University

 

Collection: Environmental Sciences and Ecology

 
45 John Gouwens Academy Carillonneur, Culver
 

Summary:  form, where a recurring theme alternates with contrasting themes along the way (ABACA). It has

  

Source: Fang, Yuguang "Michael" - Department of Electrical and Computer Engineering, University of Florida

 

Collection: Engineering ; Computer Technologies and Information Sciences

 
46 Examen II.-Dise~no de Algoritmos Eleazar Leal
 

Summary:  abaca. Notas sobre la ejecuci´on del algoritmo: Este algoritmo calcula una matriz fila por fila... a derecha sobre X permiten obtener Y al final. 8. Soluci´on al problema de convertir cbbaxa en abaca El n... cadena cbbaxa en abaca es D[5][6] = 3 --la matriz D arranca sus ´indices desde 0. La secuencia de estas

  

Source: Meza, Oscar J. - Departamento de Computación y Tecnología de la Información, Universidad Simón Bolívar

 

Collection: Computer Technologies and Information Sciences

 
47 Introductory Computer Graphics Penny Rheingans
 

Summary:  with barycentric triangle ­ e+td = a+(b-a)+(c-a) ­ In triangle if > 0, > 0, + < 1 boolean raytri (ray r, vector

  

Source: Rheingans, Penny - Department of Computer Science and Electrical Engineering, University of Maryland, Baltimore County

 

Collection: Computer Technologies and Information Sciences

 
48 FEATURE-BASED PROCESS PLANNING AND AUTOMATIC NUMERICAL CONTROL
 

Summary:  clipping algorithm based on binary-weighted curve skeleton is developed to remove unproductive tool cuts... FEATURE-BASED PROCESS PLANNING AND AUTOMATIC NUMERICAL CONTROL PART PROGRAMMING by Chih-Cheng Ho... of featuresmakingitpossible to design complexparts withgreater exibility, but also be able to ...

  

Source: Utah, University of - School of Computing, Geometric Design and Computation Group

 

Collection: Computer Technologies and Information Sciences

 
49 S E M I N A R S 2 0 1 0 2 0 1 1
 

Summary:  , and the difference between waterleaf and watercolor paper. You will prepare cotton, linen, abaca, flax, and rice

  

Source: Garfunkel, Eric - Department of Chemistry and Chemical Biology, Rutgers University

 

Collection: Materials Science ; Chemistry

 
50 Finite Orbits of Language Operations Emilie Charlier1
 

Summary:  the first; the rest are similar. From Theorem 2 we get acacaca aca. Hence ab(acacaca) ab(aca... ), or equivalently, aba(cacaca) aba(ca). Since aba ab from Lemma 1, we get abcacaca abca. 4 Additional identities

  

Source: Shallit, Jeffrey O. - School of Computer Science, University of Waterloo

 

Collection: Computer Technologies and Information Sciences

 
51 Coordinate free concept of multiscale systems Vladimir Goldshtein
 

Summary:  algorithm based on the GQL procedure, proposed in our previous papers has been modified for practical... that corresponds geometrically to standard SPS systems. The GQL represents a robust automatic reduction procedure... it has been shown that this approach can be successfully applied numerically. The robust ...

  

Source: Gorban, Alexander N. - Department of Mathematics, University of Leicester

 

Collection: Multidisciplinary Databases and Resources ; Computer Technologies and Information Sciences

 
52 Pattern Search in a Single
 

Summary:  with faster running times would be needed. Page 4 The pattern is AB and the string is ABACA. When the shift... because the process of either a for loop or a while loop happens automatically within the python programme

  

Source: Goldschmidt, Christina - Department of Statistics, University of Warwick

 

Collection: Mathematics

 
53 Swarm-Intelligent Systems Group School of Computer and Communication Sciences
 

Summary:  swarm-intelligent algorithms based on recent findings about animal societies · To implement realistic... methodologies for automatic design and optimization of distributed, self-org. systems · To propose original

  

Source: 

 

Collection: Computer Technologies and Information Sciences

 
54 Internship Project Proposal Developing a Robust SMT Solver by Understanding
 

Summary:  /software verification, planning and scheduling. The purpose of this project is to learn different SAT algorithms based... of many AI problems, including automatic deduction, bioinformatics, diagnosis, hardware

  

Source: Anbulagan, A. - National ICT Australia & Computer Sciences Laboratory, Australian National University

 

Collection: Computer Technologies and Information Sciences

 
55 BioMed Central Page 1 of 3
 

Summary:  -enhancement data, a ring detection algorithm based on the Hankel transform is used to initialise the position... Magnetic Resonance Open AccessMeeting abstract 1093 Automatic delineation of endo- and epicardial contours... , automatically performing this task is challenging [2] and, to our knowledge, not yet ...

  

Source: Ecole Polytechnique, Centre de mathématiques

 

Collection: Mathematics

 
56 A Formal Theory of Inductive Inference. Ray J. Solomono#
 

Summary:  interactions are automatically considered. Basically the coding method consists of defining certain sequences... letters. The intermediate code AB#A,C#A## (42) would represent the fact that # is defined to be AB

  

Source: Solomonoff, Ray - Lincoln Laboratory, Massachusetts Institute of Technology

 

Collection: Mathematics

 
57 J. Phys. I Yance 7 (1997) 303-327 FEBRUARY 1997, PAGE 303 Replica Symlnetry Breaking and the Kuhn-Tucker Cavity Method
 

Summary:  parallel AdaTron iterations. Indices corresponding to patterns, which are automatically implemented without

  

Source: Ecole Polytechnique, Centre de mathématiques

 

Collection: Mathematics

 
58 Bulgarian Joun]al of Physics 22 Nos 3/4 (1995) 39~}7 ANALYTICAL AND NUMERICAL
 

Summary:  .ensity, abaca~L2 3.5 4 Fig. 4. Numerical results for the induced phase shift (a) and the dep]e- tion (b

  

Source: Saltiel, Solomon - Faculty of Physics, University of Sofia

 

Collection: Physics

 
59 Motivating Lazy Guards Paul Colley, Henk Meijer, David Rappaport
 

Summary:  but not if the guard visits in order ABACA. The class of short lazy k guardable polygons is thus a strict superset

  

Source: Rappaport, David - School of Computing, Queen's University (Kingston)

 

Collection: Computer Technologies and Information Sciences

 
60 Reflections and Notes on Euler's paper E745: De fractionibus continuis Wallisii
 

Summary:  .4) .22 )2(')2(''')4( safsBafsABAca +++-=+ We are free to choose s as we like, and a reasonable choice... after these substitutions '',''',' BBAAss aa 3 (20.3) .222 ')32(''')32(''''''')43( safsBafsABAca

  

Source: Osler, Thomas - Department of Mathematics, Rowan University

 

Collection: Mathematics


Page:   1  2  3  4  5 
Page:   1  2  3  4  5 
 
61 ccsd-00016652,version1-9Jan2006 Pulse Normalisation in Slow-Light Media
 

Summary:  . The control field makes the resonance gain rise from e-A/2 0 to H0 = exp (-Abaca/ [2 (baca + 2 s/4... Abaca/2 s). In the far wings || s and H() Hoff (), where Hoff () = exp (-A/[2(1 + i

  

Source: Ecole Polytechnique, Centre de mathématiques

 

Collection: Mathematics

 
62 ELSEVIER Physicsofthe Earthand PlanetaryInteriors96(1996) 135-145 OFTtlE EARTH
 

Summary:  ) struc- ture, the stacking sequence is ABACA with Fe layers fixed at the A and O layers alternating... ., 1991) in which the iron layers have the ABACA stacking sequence similar to the Fe and O layers

  

Source: Hemley, Russell J. - Geophysical Laboratory, Carnegie Institution for Science

 

Collection: Geosciences

 
63 Expressivity of Coalgebraic Modal Logic: The Limits and Beyond
 

Summary:  : the elements of T{a, b, c} represented by abaca and abca, respectively, are distinct (see e.g. [25... ]), but identified under Tf for all f : {a, b, c} 2 (e.g. T{b,c}(abaca) = = = = T{b,c}(abca)). 3. Let

  

Source: Schröder, Lutz - Deutschen Forschungszentrum für Künstliche Intelligenz, Universität Bremen

 

Collection: Computer Technologies and Information Sciences

 
64 This article was downloaded by:[University of California San Diego] On: 11 July 2008
 

Summary:  are composed by linearly combining their constituent conjunction patterns. To illustrate, the wordform ABACA... representation of ABACA# that is a linear combination of its six constituent patterns, and the decoding SRN

  

Source: Elman, Jeff - Department of Cognitive Science, University of California at San Diego

 

Collection: Computer Technologies and Information Sciences

 
65 PLEASE SCROLL DOWN FOR ARTICLE This article was downloaded by: [University of Pittsburgh]
 

Summary:  conjunction patterns. To illustrate, the wordform ABACA# is composed of six conjunctions: A in the first... the conjunction. The encoding SRN generates a wordform representation of ABACA# that is a linear combination

  

Source: Plaut, David C. - Department of Psychology and School of Computer Science, Carnegie Mellon University

 

Collection: Computer Technologies and Information Sciences

 
66 Automatic Segmentation of Object Region Using Graph Cuts Based on Saliency Maps and AdaBoost
 

Summary:  with this problem, an automatic segmentation algorithm based on AdaBoost learning and iterative Graph- Cuts has been... Automatic Segmentation of Object Region Using Graph Cuts Based on Saliency Maps and AdaBoost Keita... been obtained by semi-automatic or interactive methods that require ...

  

Source: Takiguchi, Tetsuya - Department of Computer and Systems Engineering, Kobe University

 

Collection: Computer Technologies and Information Sciences

 
67 3D TARGET SCALE ESTIMATION FOR SIZE PRESERVING IN PTZ VIDEO TRACKING Yi Yao, Besma Abidi, and Mongi Abidi
 

Summary:  algorithm based on the paraperspective projection model produces the best performance with respect... approach [5]. Among existing target scale estimation algorithms, the algorithms based on SFM appear... comparable computations. Scale estimation algorithms based on ...

  

Source: Abidi, Mongi A. - Department of Electrical and Computer Engineering, University of Tennessee

 

Collection: Computer Technologies and Information Sciences

 
68 Stochastic Systems Polyak B. T., Shcherbakov P. S. (ICS RAS, Moscow) Reachability and
 

Summary:  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292 Shalymov D. S. (SPbSU) Cluster Stability Algorithms Based on Index or Stability Functions... of Automatic Word Extraction in Vietnamese Documents

  

Source: Granichin, Oleg - Department of Mathematics and Mechanics, St.Petersburg State Technical University

 

Collection: Mathematics ; Engineering

 
69 Strodt's approach to differential equations in the complex domain In [1] Strodt deals with principal solutions to standard algebraic ODEs in the complex do-
 

Summary:  of successive iterated logs). He obtains principal solutions using an algorithm based on the Newton-Ritt polygon... is stronger than the usual in the sense that it involves a condition on the derivatives (automatic over

  

Source: Gokhman, Dmitry - Department of Applied Mathematics, University of Texas at San Antonio

 

Collection: Mathematics

 
70 An Evaluation of Formant Tracking methods on an Arabic Database Imen Jemaa 1, 2
 

Summary:  a formant database of Arabic used to evaluate our new automatic formant tracking algorithm based on Fourier... describe our new automatic formant tracking algorithm based on the detection of Fourier ridges which... in the process of selecting formant frequencies from ...

  

Source: Ecole Polytechnique, Centre de mathématiques

 

Collection: Mathematics

 
71 Abstract nummer 750463 Canonical decomposition of ictal EEG reliably detects the
 

Summary:  : The aim of this study was to develop and validate an ictal source localisation algorithm based... atom can be visually determined or automatically detected when seizure activity can be seen in the EEG... was used as the golden standard for ictal source localisation. The results of this automatic method were

  

Source: Leuven, Katholieke Universiteit, Department of Electrical Engineering, SCD Division

 

Collection: Engineering

 
72 ECOLE DES MINES Ecole Doctorale 364 : Sciences Fondamentales et Appliques
 

Summary:  de cellulose native, d'origine diverse (coton, bois, ramie, jute, lin, chanvre, sisal et abaca). Les... (sisal et abaca) ou de tige (lin, ramie, jute et chanvre) nous sont fournis sous deux formes: des fibres... le sisal ou l'abaca, alors qu'il ne l'est pas pour les fibres de bois et de coton). La présence des

  

Source: Ecole Polytechnique, Centre de mathématiques

 

Collection: Mathematics

 
73 Symposium on Geometry Processing 2005 We present an algorithm for the automatic alignment of two 3D shapes (data and model), without any assumptions about their initial positions. The algorithm computes for each surface point a descriptor based on local g
 

Summary:  to find potential corresponding points. We then develop a fast branch-and-bound algorithm based... Symposium on Geometry Processing 2005 We present an algorithm for the automatic alignment of two 3D... of feature points are automatically picked from the data shape according to the uniqueness of the descriptor

  

Source: Mitra, Niloy J. - Division of Mathematical and Computer Sciences and Engineering, King Abdullah University of Science and Technology

 

Collection: Computer Technologies and Information Sciences

 
74 Link Scheduling Algorithms for Wireless Mesh Networks
 

Summary:  classified into three categories: algorithms based on modeling the network by a two-tier or communication... graph, "hybrid" algorithms based on modeling the network by a communication graph and verifying SINR... conditions and algorithms based on modeling the ...

  

Source: Karandikar, Abhay - Department of Electrical Engineering, Indian Institute of Technology Bombay

 

Collection: Computer Technologies and Information Sciences ; Engineering

 
75 arXiv:cond-mat/0304614v127Apr2003 Functional Renormalization Group and the Field Theory of
 

Summary:  . There the cancellation of the 1/ 2 -terms in the anomalous part is more complicated but automatic. It requires

  

Source: Wiese, Kay Jörg - Laboratoire de Physique Théorique, Département de Physique, École Normale Supérieure

 

Collection: Physics

 
76 INFORMATION Mailing Address
 

Summary:  using ITK - Developing image filtering algorithms based on differential and statistical information... : Camera Planning for Automatic Generation of Computer Animation B.S. in Computer Science July 1995... : Camera Planning in Automatic Generation of Computer Animation - Designed a software layer that can

  

Source: Du, Haixa - Office of High Performance Computing and Communications, National Library of Medicine

 

Collection: Computer Technologies and Information Sciences

 
77 INTERPOLATION OF NUMBERS OF CATALAN TYPE IN A LOCAL FIELD OF POSITIVE CHARACTERISTIC
 

Summary:  automatically also have ``two­sided'' asymptotic interpolation # a # # = F (#, (#(a) -1 #) #a# ) for a # k... ,c;#,#] (X, Y )) #a# = (#(a)F ) [b,c;#(a)#,#(a)#] (X #a# , Y #a# ) = (#(a)F ) [ab,ac;#(a)#,#] (X, Y ). Given

  

Source: Anderson, Greg W. - School of Mathematics, University of Minnesota

 

Collection: Mathematics

 
78 Automatic Annotation and Semantic Search from Protg Miriam Fernndez, David Vallet, and Pablo Castells
 

Summary:  . Weights are computed automatically by an adaptation of the IF-TDF algorithm, based on the frequency... Automatic Annotation and Semantic Search from Protégé Miriam Fernández, David Vallet, and Pablo... hierarchies that are merely used as classification schemes, and are never instantiated. 2. ...

  

Source: Universidad Autonoma de Madrid, Escuela Politécnica Superior, Information Retrievel Group

 

Collection: Computer Technologies and Information Sciences

 
79 DECISION PROBLEMS FOR FINITELY PRESENTED AND ONE-RELATION SEMIGROUPS AND MONOIDS
 

Summary:  : Example 7.8. The semigroup S = Sga, b, c | (abaca, a) has infinitely many idempotents. Proof of 7... .8. For any k 1 we have: a = abaca = ababacaca = . . . = (ab)ka(ca)k. For each k N, let uk = ba(ca)k(ba)k-1... . Notice that ({a, b, c}, (abaca, a)) is a confluent noetherian rewriting system. Thus the words uk, being

  

Source: Cain, Alan J. - Departamento de Matemática Pura, University of Porto

 

Collection: Computer Technologies and Information Sciences

 
80 Automatic Object Segmentation Algorithms for Sprite Coding using MPEG-4
 

Summary:  introduce three automatic object segmentation algorithms based on global motion estimation and background... sprites for segmentation has been outlined. In [8], a multiple sprite generation algorithm based on camera... Automatic Object Segmentation Algorithms for ...

  

Source: Wichmann, Felix - Fakultät für Elektrotechnik und Informationstechnik, Technische Universität Berlin

 

Collection: Computer Technologies and Information Sciences


Page:   1  2  3  4  5 
Page:   1  2  3  4  5 
 
81 ccsd-00003249,version2-12Nov2004 [/FE] IN THE THIN AND THE THICK DISK -TOWARDS AN AUTOMATIC PARAMETRIZATION OF
 

Summary:  of reference stars with well determined atmo- spheric parameters. ETOILE is a minimum distance algorithm based... ccsd-00003249,version2-12Nov2004 1 [/FE] IN THE THIN AND THE THICK DISK - TOWARDS AN AUTOMATIC... 'Univers, L3AB, 2 rue de l'Observatoire, BP 89, 33270 Floirac, France. ABSTRACT We test an ...

  

Source: Ecole Polytechnique, Centre de mathématiques

 

Collection: Mathematics

 
82 ccsd00003249, [ /FE] IN THE THIN AND THE THICK DISK TOWARDS AN AUTOMATIC PARAMETRIZATION OF
 

Summary:  determined atmo­ spheric parameters. ETOILE is a minimum distance algorithm based on the perturbation method... AN AUTOMATIC PARAMETRIZATION OF STELLAR SPECTRA. Pascal Girard, Caroline Soubiran Observatoire Aquitain des... an automatic procedure to measure [Fe/H] and [#11;/Fe] on high resolution spectra. ...

  

Source: Ecole Polytechnique, Centre de mathématiques

 

Collection: Mathematics

 
83 IEEE TRANSACTIONS ON SYSTEMS, MAN AND CYBERNETICS--PART B: CYBERNETICS, VOL. , NO. , 2004 1 Sparse Modeling Using Orthogonal Forward
 

Summary:  motivation is twofold. Firstly, we aim to derive a construction algorithm based directly on optimizing model... to the model construction process, and the LROLS algorithm (based on the training MSE) are known to offer... 1 (k) #1; #1; #1; wnM (k)] T . III. THE OLS ALGORITHM ...

  

Source: Chen, Sheng - School of Electronics and Computer Science, University of Southampton

 

Collection: Engineering

 
84 4D Frequency Analysis of Computational Cameras for
 

Summary:  input #12;Lattice-focal input #12;All focused image output (automatic) #12;Depth map output (automatic... ) #12;Standard lens input #12;Lattice-focal input #12;All focused image output (automatic) #12;Depth map... output (automatic) #12;Standard lens input #12;Lattice-focal input #12;All focused image output

  

Source: 

 

Collection: Computer Technologies and Information Sciences

 
85 Motivic Functors Bjrn Ian Dundas, Oliver R ondigs, Paul Arne stvr
 

Summary:  homotopy theory from algebraic topology, but which unfortunately does not automatically agree... finitely many cells from M such that ## = #. Set #(A) := colim A#B#ac(A) B. Note that the objects in ac

  

Source: Dundas, Bjørn Ian - Department of Mathematical Sciences, Norwegian University of Science and Technology

 

Collection: Mathematics

 
86 Typed Event Structures and the -Calculus Daniele Varacca, Nobuko Yoshida
 

Summary:  the operational and the denotational semantics, we obtain automatically the correspondence between the two

  

Source: Yoshida, Nobuko - Department of Computing, Imperial College, London

 

Collection: Computer Technologies and Information Sciences

 
87 SPIE Newsroom 10.1117/2.1xxxxxx.xxxx
 

Summary:  recognition algorithms based on lo- (a) (b) Figure 1. Fig 1(a) shows the facial fiducial points associated... .6%. It significantly outperformed the existing baseline algorithms based on princi- pal component analysis (PCA... . Figure 2. Cumulative match characteristic curves for 3D face recogni- tion ...

  

Source: Texas at Austin, University of - Department of Biomedical Engineering, Ultrasound Imaging and Therapeutics Research Laboratory

 

Collection: Engineering ; Biology and Medicine

 
88 This article was originally published in a journal published by Elsevier, and the attached copy is provided by Elsevier for the
 

Summary:  , abaca, and straw) to prepare composites. How- ever, work done on recycled plastic/natural fiber systems... ] Shibata M, Ozawa K, Teramoto N, Yosomiya R, Takeishi H. Biocomposites made from short abaca fiber

  

Source: Louisiana Forest Products Development Center; Wu, Qinglin - School of Renewable Natural Resources, Louisiana State University

 

Collection: Engineering ; Renewable Energy

 
89 Expressivity of Coalgebraic Modal Logic: The Limits and Beyond
 

Summary:  not admit a separating set of predicate liftings: the elements of Tfa; b; cg represented by abaca and abca... ;cg (abaca) = ?>?>? = ?>? = ?>>? = T#31; fb;cg (abca)). 3. Let T be the non-repetitive list functor; i.e. TX

  

Source: Schröder, Lutz - Deutschen Forschungszentrum für Künstliche Intelligenz, Universität Bremen

 

Collection: Computer Technologies and Information Sciences

 
90 Dynamic Parameter Spring Model for Automatic Graph Layout
 

Summary:  .2.........(............................../)(log)( 2 iFiFiF idCiF CidCiF rs rr dss += = = 8 #12;2.3.3 Spring Modeling Algorithm Based... . This is exactly what we achieve in DPSM. 3.4 Algorithms Based on the definition of DPSM, this section will give... and edges, which provides a physical model for the ...

  

Source: Tanaka, Jiro - Department of Computer Science, University of Tsukuba

 

Collection: Computer Technologies and Information Sciences

 
91 Journal of Experimental Psychology: Learning, Memory, and Cognition
 

Summary:  , children learn to add with a general counting algorithm, based on knowledge of the sequence of numbers... , memory-based performance should be fast compared with algorithm-based performance, because in theory... -195 Copyright 1991 by the American Psychological Association, Inc. 0278-7393/91/$3.00 ...

  

Source: Palmeri, Thomas - Department of Psychology, Vanderbilt University

 

Collection: Biology and Medicine

 
92 Paper Title 3D Face Recognition based on Geodesic Distances
 

Summary:  probes only. It is evident that the two algorithms based on Euclidean or geodesic distances between... (EER = 16.5%, RR = 69.7%). The algorithms based on geodesic distance features performed on a par... with the algorithm based on Euclidean distance features. Both ...

  

Source: Texas at Austin, University of - Department of Biomedical Engineering, Ultrasound Imaging and Therapeutics Research Laboratory

 

Collection: Engineering ; Biology and Medicine

 
93 CIRAD -UPR 26 Systmes de culture bananiers, plantains, ananas Prsente pour obtenir le grade de docteur dlivr par
 

Summary:  cultivées du genre Musa (banane, plantain, abaca) (Gold et al. 2001) (Figure I-4). Le bananier est une

  

Source: Ecole Polytechnique, Centre de mathématiques

 

Collection: Mathematics

 
94 Robust Methods for Engineering Design Optimization
 

Summary:  Algorithms · Based on principle of survival of the fittest · True global search algorithm that can avoid... · Algorithms based on construction of surrogate models (response surfaces) that can be evaluated quickly... #12;7 Flowchart of automatic switching among modules in a hybrid ...

  

Source: Dennis, Brian - Department of Mechanical and Aerospace Engineering, University of Texas at Arlington

 

Collection: Engineering

 
95 100 IEEE SIGNAL PROCESSING LETTERS, VOL. 13, NO. 2, FEBRUARY 2006 Subspace Identification Through Blind
 

Summary:  ) algorithms based on mutual information, only sources with non-Gaussian distribution are consistently... for consistency have been published so far. In this letter, we prove that for BSS algorithms based on mu- tual... - tiple iterations of BSS algorithms based on ...

  

Source: Kuehnlenz, Kolja - Institute of Automatic Control Engineering, Technische Universität München

 

Collection: Engineering

 
96 Automatic Kernel Regression Modelling Using Combined LeaveOneOut Test Score and Regularised Orthogonal Least Squares
 

Summary:  be applied to construct the automatic algorithm. The proposed ROLS algorithm based on the PRESS statistic... ­conditioning problem is automatically avoided. The model selection procedure of this ROLS algorithm based on the PRESS... the proposed ROLS ...

  

Source: Chen, Sheng - School of Electronics and Computer Science, University of Southampton

 

Collection: Engineering

 
97 Applications: n Telecommunications: cell /
 

Summary:  that uses built-in quantum keys to replace conventional algorithm based encrypted communication. The QKar... which cryptographic-quality secret random numbers are automatically uploaded. These numbers

  

Source: Los Alamos National Laboratory, Theoretical Division, Condensed Matter and Statistical Physics Group

 

Collection: Materials Science

 
98 VLSI Standard Cell Design Using Genetic Algorithms Benjamin Bishop Khaled Rasheed Anil Bahuman
 

Summary:  to be Selective in Genetic-Algorithm-Based Design Optimization, Ar- ti#12;cial Intelligence in Engineering, Design... and custom tailoring. On the other hand, current automatically generated libraries are less eÆ- cient than

  

Source: Bishop, Benjamin - Department of Computing Sciences, University of Scranton

 

Collection: Computer Technologies and Information Sciences

 
99 Seek and ye shall find I promised I would be more upbeat this month so apart from a minor go at British
 

Summary:  have been working on a 'discovery engine', a bibliographic research project developing new algorithms... based on a technology known as 'Chance Discovery' first developed in Japan, with the object... , this does not match our records." Flipping into automatic software test mode, I duly entered exactly

  

Source: Hatton, Les - School of Computing and Information Systems, Kingston University

 

Collection: Computer Technologies and Information Sciences

 
100 The Protein Space From Sequence to Structure to Function
 

Summary:  Prot proteins Hierarchical A clustering algorithm based on a `merging score' Graph based Pairwise distances (all... of automatic classifications of all proteins Seeking statistically significant regularities (clusters

  

Source: Linial, Michal - Sudarsky Center for Computational Biology & Department of Biological Chemistry, Hebrew University of Jerusalem

 

Collection: Biology and Medicine


Page:   1  2  3  4  5