Sciweavers

2373 search results - page 384 / 475
» Complexities for generalized models of self-assembly
Sort
View
AAAI
2010
15 years 6 months ago
Bypassing Combinatorial Protections: Polynomial-Time Algorithms for Single-Peaked Electorates
For many election systems, bribery (and related) attacks have been shown NP-hard using constructions on combinatorially rich structures such as partitions and covers. It is import...
Felix Brandt, Markus Brill, Edith Hemaspaandra, La...
BCSHCI
2008
15 years 6 months ago
Low cost prototyping: part 1, or how to produce better ideas faster by getting user reactions early and often
Although approaches to User Centered Software Development have existed for almost 20 years a rift still exists between theory and practice. In practice, many software projects are...
Stephen Brown, Andreas Holzinger
DAGSTUHL
2010
15 years 6 months ago
Tracking Lines in Higher Order Tensor Fields
While tensors occur in many areas of science and engineering, little has been done to visualize tensors with order higher than two. Tensors of higher orders can be used for exampl...
Mario Hlawitschka, Gerik Scheuermann
COMAD
2008
15 years 6 months ago
REBMEC: Repeat Based Maximum Entropy Classifier for Biological Sequences
An important problem in biological data analysis is to predict the family of a newly discovered sequence like a protein or DNA sequence, using the collection of available sequence...
Pratibha Rani, Vikram Pudi
DGO
2007
123views Education» more  DGO 2007»
15 years 6 months ago
Cross-national information policy conflict regarding access to information: building a conceptual framework
This paper addresses cross-national information policy conflict regarding access to information. This type of information policy conflict appears more complex and controversial th...
Lei Zheng