Sciweavers

15794 search results - page 3157 / 3159
» Agent-Oriented Software Engineering
Sort
View
CLEF
2009
Springer
13 years 5 months ago
Clustering for Text and Image-Based Photo Retrieval at CLEF 2009
For this year's Image CLEF Photo Retrieval task, we have prepared 5 submission runs to help us assess the effectiveness of 1) image content-based retrieval, and 2) textbased ...
Qian Zhu, Diana Inkpen
ICDM
2009
IEEE
162views Data Mining» more  ICDM 2009»
13 years 5 months ago
The Flexible Climate Data Analysis Tools (CDAT) for Multi-model Climate Simulation Data
Being able to incorporate, inspect, and analyze data with newly developed technologies, diagnostics, and visualizations in an easy and flexible way has been a longstanding challen...
Dean N. Williams, Charles M. Doutriaux, Robert S. ...
BC
2010
163views more  BC 2010»
13 years 4 months ago
Action and behavior: a free-energy formulation
We have previously tried to explain perceptual inference and learning under a free-energy principle that pursues Helmholtz's agenda to understand the brain in terms of energy ...
Karl J. Friston, Jean Daunizeau, James Kilner, Ste...
BIB
2010
140views more  BIB 2010»
13 years 4 months ago
Next generation sequencing in functional genomics
Genome-wide sequencing has enabled modern biomedical research to relate more and more events in healthy as well as disease-affected cells and tissues to the genomic sequence. Now ...
Thomas Werner
CCS
2010
ACM
13 years 4 months ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...
« Prev « First page 3157 / 3159 Last » Next »