Sciweavers

1418 search results - page 282 / 284
» How to Explain Mistakes
Sort
View
BMCBI
2011
12 years 10 months ago
New Words in Human Mutagenesis
Background: The substitution rates within different nucleotide contexts are subject to varying levels of bias. The most well known example of such bias is the excess of C to T (C ...
Alexander Y. Panchin, Sergey I. Mitrofanov, Andrei...
EDBT
2011
ACM
222views Database» more  EDBT 2011»
12 years 10 months ago
The hidden web, XML and the Semantic Web: scientific data management perspectives
The World Wide Web no longer consists just of HTML pages. Our work sheds light on a number of trends on the Internet that go beyond simple Web pages. The hidden Web provides a wea...
Fabian M. Suchanek, Aparna S. Varde, Richi Nayak, ...
FSE
2011
Springer
289views Cryptology» more  FSE 2011»
12 years 10 months ago
On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model
Abstract. Bellare and Kohno introduced a formal framework for the study of related-key attacks against blockciphers. They established sufficient conditions (output-unpredictabilit...
Martin R. Albrecht, Pooya Farshim, Kenny G. Paters...
HRI
2011
ACM
12 years 10 months ago
Human-robot proxemics: physical and psychological distancing in human-robot interaction
To seamlessly integrate into the human physical and social environment, robots must display appropriate proxemic behavior—that is, follow societal norms in establishing their ph...
Jonathan Mumm, Bilge Mutlu
PROCEDIA
2011
12 years 9 months ago
10x10: A General-purpose Architectural Approach to Heterogeneity and Energy Efficiency
Two decades of microprocessor architecture driven by quantitative 90/10 optimization has delivered an extraordinary 1000-fold improvement in microprocessor performance, enabled by...
Andrew A. Chien, Allan Snavely, Mark Gahagan