Sciweavers

191 search results - page 37 / 39
» Machine Reading
Sort
View
BMCBI
2007
95views more  BMCBI 2007»
13 years 7 months ago
Methods for estimating human endogenous retrovirus activities from EST databases
Background: Human endogenous retroviruses (HERVs) are surviving traces of ancient retrovirus infections and now reside within the human DNA. Recently HERV expression has been dete...
Merja Oja, Jaakko Peltonen, Jonas Blomberg, Samuel...
AMAI
2000
Springer
13 years 7 months ago
A prospective on mathematics and artificial intelligence: Problem solving=Modeling+Theorem proving
This is a prospective on the research in the intersection of mathematics and artificial intelligence that I see as having been the most important over the past 10 years and that I...
Harvey J. Greenberg
IJMMS
1998
153views more  IJMMS 1998»
13 years 7 months ago
Brahms: simulating practice for work systems design
A continuing problem in business today is the design of human-computer systems that respect how work actually gets done. The overarching context of work consists of activities, wh...
William J. Clancey, Patricia Sachs, Maarten Sierhu...
NECO
1998
151views more  NECO 1998»
13 years 7 months ago
Nonlinear Component Analysis as a Kernel Eigenvalue Problem
We describe a new method for performing a nonlinear form of Principal Component Analysis. By the use of integral operator kernel functions, we can e ciently compute principal comp...
Bernhard Schölkopf, Alex J. Smola, Klaus-Robe...
RV
2010
Springer
127views Hardware» more  RV 2010»
13 years 6 months ago
You Should Better Enforce Than Verify
This tutorial deals with runtime enforcement which is an extension of runtime verification aiming to circumvent misbehaviors of systems. After an historical overview of previous a...
Yliès Falcone