Sciweavers

236 search results - page 40 / 48
» How Can Intra Correlation Be Exploited Better
Sort
View
EICS
2009
ACM
14 years 2 months ago
User evaluation of OIDE: a rapid prototyping platform for multimodal interaction
The Open Interface Development Environment (OIDE) was developed as part of the OpenInterface (OI) platform, an open source framework for the rapid development of multimodal intera...
Marilyn Rose McGee-Lennon, Andrew Ramsay, David K....
DOCENG
2007
ACM
14 years 10 days ago
SALT: a semantic approach for generating document representations
The structure of a document has an important influence on the perception of its content. Considering scientific publications, we can affirm that by making use of the ordinary line...
Tudor Groza, Alexander Schutz, Siegfried Handschuh
CORR
2008
Springer
98views Education» more  CORR 2008»
13 years 8 months ago
An Information-Theoretical View of Network-Aware Malware Attacks
This work investigates three aspects: (a) a network vulnerability as the non-uniform vulnerable-host distribution, (b) threats, i.e., intelligent malwares that exploit such a vulne...
Zesheng Chen, Chuanyi Ji
GECCO
2009
Springer
14 years 1 months ago
The sensitivity of HyperNEAT to different geometric representations of a problem
HyperNEAT, a generative encoding for evolving artificial neural networks (ANNs), has the unique and powerful ability to exploit the geometry of a problem (e.g., symmetries) by enc...
Jeff Clune, Charles Ofria, Robert T. Pennock
BMCBI
2007
114views more  BMCBI 2007»
13 years 8 months ago
Combination of scoring schemes for protein docking
Background: Docking algorithms are developed to predict in which orientation two proteins are likely to bind under natural conditions. The currently used methods usually consist o...
Philipp Heuser, Dietmar Schomburg