Sciweavers

2399 search results - page 428 / 480
» On Authentication between Human and Computer
Sort
View
GECCO
2008
Springer
174views Optimization» more  GECCO 2008»
13 years 9 months ago
Mask functions for the symbolic modeling of epistasis using genetic programming
The study of common, complex multifactorial diseases in genetic epidemiology is complicated by nonlinearity in the genotype-to-phenotype mapping relationship that is due, in part,...
Ryan J. Urbanowicz, Nate Barney, Bill C. White, Ja...
ICASSP
2010
IEEE
13 years 8 months ago
Empirical Type-i filter design for image interpolation
Empirical filter designs generalize relationships inferred from training data to effect realistic solutions that conform well to the human visual system. Complex algorithms invol...
Karl S. Ni, Truong Q. Nguyen
CCR
2010
171views more  CCR 2010»
13 years 8 months ago
Fighting online click-fraud using bluff ads
Online advertising is currently the richest source of revenue for many Internet giants. The increased number of online businesses, specialized websites and modern profiling techni...
Hamed Haddadi
CGF
2008
103views more  CGF 2008»
13 years 8 months ago
Image-based Shaving
Many categories of objects, such as human faces, can be naturally viewed as a composition of several different layers. For example, a bearded face with glasses can be decomposed i...
Minh Hoai Nguyen, Jean-François Lalonde, Al...
COGSCI
2008
87views more  COGSCI 2008»
13 years 8 months ago
Processing Polarity: How the Ungrammatical Intrudes on the Grammatical
A central question in online human sentence comprehension is: how are linguistic relations established between different parts of a sentence? Previous work has shown that this dep...
Shravan Vasishth, Sven Brüssow, Richard L. Le...