Sciweavers

3829 search results - page 204 / 766
» Improving Our Reviewing Processes
Sort
View
CCS
2008
ACM
15 years 6 months ago
User-controllable learning of security and privacy policies
Studies have shown that users have great difficulty specifying their security and privacy policies in a variety of application domains. While machine learning techniques have succ...
Patrick Gage Kelley, Paul Hankes Drielsma, Norman ...
BMCBI
2008
126views more  BMCBI 2008»
15 years 4 months ago
c-REDUCE: Incorporating sequence conservation to detect motifs that correlate with expression
Background: Computational methods for characterizing novel transcription factor binding sites search for sequence patterns or "motifs" that appear repeatedly in genomic ...
Katerina Kechris, Hao Li
CIVR
2009
Springer
229views Image Analysis» more  CIVR 2009»
15 years 11 months ago
A human-machine collaborative approach to tracking human movement in multi-camera video
Although the availability of large video corpora are on the rise, the value of these datasets remain largely untapped due to the difficulty of analyzing their contents. Automatic ...
Philip DeCamp, Deb Roy
GECCO
2005
Springer
149views Optimization» more  GECCO 2005»
15 years 10 months ago
There's more to a model than code: understanding and formalizing in silico modeling experience
Mapping biology into computation has both a domain specific aspect – biological theory – and a methodological aspect – model development. Computational modelers have implici...
Janet Wiles, Nicholas Geard, James Watson, Kai Wil...
WSC
1997
15 years 6 months ago
AutoSched Tutorial
The AutoSchedTM finite capacity planning and scheduling tool helps you increase throughput, reduce in-process inventory, and increase equipment and personnel utilization. AutoSche...
Bill Lindler