Sciweavers

191 search results - page 37 / 39
» Machine Reading
Sort
View
118
Voted
BMCBI
2007
95views more  BMCBI 2007»
15 years 2 months ago
Methods for estimating human endogenous retrovirus activities from EST databases
Background: Human endogenous retroviruses (HERVs) are surviving traces of ancient retrovirus infections and now reside within the human DNA. Recently HERV expression has been dete...
Merja Oja, Jaakko Peltonen, Jonas Blomberg, Samuel...
131
Voted
AMAI
2000
Springer
15 years 2 months ago
A prospective on mathematics and artificial intelligence: Problem solving=Modeling+Theorem proving
This is a prospective on the research in the intersection of mathematics and artificial intelligence that I see as having been the most important over the past 10 years and that I...
Harvey J. Greenberg
131
Voted
IJMMS
1998
153views more  IJMMS 1998»
15 years 1 months ago
Brahms: simulating practice for work systems design
A continuing problem in business today is the design of human-computer systems that respect how work actually gets done. The overarching context of work consists of activities, wh...
William J. Clancey, Patricia Sachs, Maarten Sierhu...
126
Voted
NECO
1998
151views more  NECO 1998»
15 years 1 months ago
Nonlinear Component Analysis as a Kernel Eigenvalue Problem
We describe a new method for performing a nonlinear form of Principal Component Analysis. By the use of integral operator kernel functions, we can e ciently compute principal comp...
Bernhard Schölkopf, Alex J. Smola, Klaus-Robe...
137
Voted
RV
2010
Springer
127views Hardware» more  RV 2010»
15 years 18 days ago
You Should Better Enforce Than Verify
This tutorial deals with runtime enforcement which is an extension of runtime verification aiming to circumvent misbehaviors of systems. After an historical overview of previous a...
Yliès Falcone