Sciweavers

609 search results - page 104 / 122
» Multilingual Subjectivity Analysis Using Machine Translation
Sort
View
GECCO
2005
Springer
126views Optimization» more  GECCO 2005»
14 years 1 months ago
Is negative selection appropriate for anomaly detection?
Negative selection algorithms for hamming and real-valued shape-spaces are reviewed. Problems are identified with the use of these shape-spaces, and the negative selection algori...
Thomas Stibor, Philipp H. Mohr, Jonathan Timmis, C...
CIKM
2009
Springer
13 years 11 months ago
Suffix trees for very large genomic sequences
A suffix tree is a fundamental data structure for string searching algorithms. Unfortunately, when it comes to the use of suffix trees in real-life applications, the current metho...
Marina Barsky, Ulrike Stege, Alex Thomo, Chris Upt...
CCS
2008
ACM
13 years 9 months ago
Towards practical biometric key generation with randomized biometric templates
Although biometrics have garnered significant interest as a source of entropy for cryptographic key generation, recent studies indicate that many biometric modalities may not actu...
Lucas Ballard, Seny Kamara, Fabian Monrose, Michae...
CE
2004
128views more  CE 2004»
13 years 7 months ago
The role of educational software as a support for teaching and learning conversations
: Much recent educational research focuses on teaching and learning within classroom conversations. This raises the question of the role of ICT as a support for such conversations....
Rupert Wegerif
MFCS
2010
Springer
13 years 6 months ago
Robust Computations with Dynamical Systems
Abstract. In this paper we discuss the computational power of Lipschitz dynamical systems which are robust to infinitesimal perturbations. Whereas the study in [1] was done only f...
Olivier Bournez, Daniel S. Graça, Emmanuel ...