Sciweavers

184 search results - page 32 / 37
» Fairness in Wallets with Observer
Sort
View
UAI
2007
13 years 9 months ago
"I Can Name that Bayesian Network in Two Matrixes!"
The traditional approach to building Bayesian networks is to build the graphical structure using a graphical editor and then add probabilities using a separate spreadsheet for eac...
Russell Almond
WWW
2007
ACM
14 years 8 months ago
Communication as information-seeking: the case for mobile social software for developing regions
In this paper, we describe several findings from a multi-year, multi-method study of how information and communication technologies have been adopted and adapted in Central Asia. ...
Beth E. Kolko, Emma J. Rose, Erica J. Johnson
CHI
2005
ACM
14 years 8 months ago
Work coordination, workflow, and workarounds in a medical context
In this paper we report an ethnographic study of workarounds--informal temporary practices for handling exceptions to normal workflow--in a hospital environment. Workarounds are a...
Marina Kobayashi, Susan R. Fussell, Yan Xiao, F. J...
RECOMB
2010
Springer
14 years 2 months ago
Genomic DNA k-mer Spectra: Models and Modalities
Background: The empirical frequencies of DNA k-mers in whole genome sequences provide an interesting perspective on genomic complexity, and the availability of large segments of g...
Benny Chor, David Horn, Nick Goldman, Yaron Levy, ...
MICRO
2009
IEEE
191views Hardware» more  MICRO 2009»
14 years 2 months ago
Pseudo-LIFO: the foundation of a new family of replacement policies for last-level caches
Cache blocks often exhibit a small number of uses during their life time in the last-level cache. Past research has exploited this property in two different ways. First, replacem...
Mainak Chaudhuri