Sciweavers

988 search results - page 137 / 198
» Positive Results and Techniques for Obfuscation
Sort
View
ISBI
2006
IEEE
14 years 9 months ago
Molecular image registration using mutual information and differential evolution optimization
In this work we propose a novel rigid image registration approach to determine the position of high-resolution molecular structures in medium-resolution macromolecular complexes. ...
Bartosz Telenczuk, María J. Ledesma-Carbayo...
CHI
2009
ACM
14 years 9 months ago
In CMC we trust: the role of similarity
This paper examines how different forms of linguistic similarity in a text-chat environment relate to the establishment of interpersonal trust. Sixty-two pairs played an iterative...
Lauren E. Scissors, Alastair J. Gill, Kathleen Ger...
CHI
2008
ACM
14 years 9 months ago
The new face of procedural content: a real world approach
This paper describes a project that uses real-world computer-troubleshooting scenarios to test and expand upon the latest research and technical knowledge in the area of procedura...
Axel Roesler, Connie Douglass-Olberg, David Brunet...
CHI
2006
ACM
14 years 9 months ago
Feeling what you hear: tactile feedback for navigation of audio graphs
Access to digitally stored numerical data is currently very limited for sight impaired people. Graphs and visualizations are often used to analyze relationships between numerical ...
Steven A. Wall, Stephen A. Brewster
STOC
2005
ACM
142views Algorithms» more  STOC 2005»
14 years 9 months ago
Market equilibrium via the excess demand function
We consider the problem of computing market equilibria and show three results. (i) For exchange economies satisfying weak gross substitutability we analyze a simple discrete versi...
Bruno Codenotti, Benton McCune, Kasturi R. Varadar...