Sciweavers

2604 search results - page 470 / 521
» Human Errors and System Requirements
Sort
View
CIVR
2008
Springer
221views Image Analysis» more  CIVR 2008»
13 years 10 months ago
Annotation suggestion and search for personal multimedia objects on the web
The number of personal multimedia objects, such as digital photographs and videos, are exploding on the web through popular sites such as Flickr, YouTube, and FaceBook hosting bil...
Brendan Elliott, Z. Meral Özsoyoglu
ACL
1997
13 years 10 months ago
Approximating Context-Free Grammars with a Finite-State Calculus
Although adequate models of human language for syntactic analysis and semantic interpretation are of at least contextfree complexity, for applications such as speech processing in...
Edmund Grimley-Evans
BMCBI
2008
158views more  BMCBI 2008»
13 years 9 months ago
VarDetect: a nucleotide sequence variation exploratory tool
Background: Single nucleotide polymorphisms (SNPs) are the most commonly studied units of genetic variation. The discovery of such variation may help to identify causative gene mu...
Chumpol Ngamphiw, Supasak Kulawonganunchai, Anunch...
CORR
2010
Springer
259views Education» more  CORR 2010»
13 years 9 months ago
Community Detection in Networks: The Leader-Follower Algorithm
Natural networks such as those between humans observed through their interactions or biological networks predicted based on various experimental measurements contain a wealth of i...
Devavrat Shah, Tauhid Zaman
JOC
2007
133views more  JOC 2007»
13 years 8 months ago
Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication
In the security chain the weakest link is definitely the human one: human beings cannot remember long secrets and often resort to rather insecure solutions to keep track of their ...
Dario Catalano, David Pointcheval, Thomas Pornin