Sciweavers

56 search results - page 11 / 12
» Characterizing and Predicting Corrections in Spoken Dialogue...
Sort
View
GFKL
2005
Springer
117views Data Mining» more  GFKL 2005»
14 years 26 days ago
A Cross-cultural Evaluation Framework for Behavioral Biometric User Authentication
Today biometric techniques are based either on passive (e.g. IrisScan, Face) or active methods (e.g. voice and handwriting). In our work we focus on evaluation of the latter. These...
Franziska Wolf, T. K. Basu, Pranab K. Dutta, Claus...
USS
2008
13 years 9 months ago
Lest We Remember: Cold Boot Attacks on Encryption Keys
Contrary to popular assumption, DRAMs used in most modern computers retain their contents for several seconds after power is lost, even at room temperature and even if removed fro...
J. Alex Halderman, Seth D. Schoen, Nadia Heninger,...
BMCBI
2007
148views more  BMCBI 2007»
13 years 7 months ago
fREDUCE: Detection of degenerate regulatory elements using correlation with expression
Background: The precision of transcriptional regulation is made possible by the specificity of physical interactions between transcription factors and their cognate binding sites ...
Randy Z. Wu, Christina Chaivorapol, Jiashun Zheng,...
BMCBI
2010
142views more  BMCBI 2010»
13 years 7 months ago
Discover Protein Complexes in Protein-Protein Interaction Networks Using Parametric Local Modularity
Background: Recent advances in proteomic technologies have enabled us to create detailed protein-protein interaction maps in multiple species and in both normal and diseased cells...
Jongkwang Kim, Kai Tan
POPL
2011
ACM
12 years 10 months ago
Making prophecies with decision predicates
We describe a new algorithm for proving temporal properties expressed in LTL of infinite-state programs. Our approach takes advantage of the fact that LTL properties can often be...
Byron Cook, Eric Koskinen