Sciweavers

13224 search results - page 2445 / 2645
» Self-monitoring for Computer Users
Sort
View
BMCBI
2010
115views more  BMCBI 2010»
13 years 8 months ago
Non-coding RNA detection methods combined to improve usability, reproducibility and precision
Background: Non-coding RNAs gain more attention as their diverse roles in many cellular processes are discovered. At the same time, the need for efficient computational prediction...
Peter Raasch, Ulf Schmitz, Nadja Patenge, Julio Ve...
CCR
2010
169views more  CCR 2010»
13 years 8 months ago
On the leakage of personally identifiable information via online social networks
For purposes of this paper, we define "Personally identifiable information" (PII) as information which can be used to distinguish or trace an individual's identity ...
Balachander Krishnamurthy, Craig E. Wills
CCR
2010
171views more  CCR 2010»
13 years 8 months ago
Fighting online click-fraud using bluff ads
Online advertising is currently the richest source of revenue for many Internet giants. The increased number of online businesses, specialized websites and modern profiling techni...
Hamed Haddadi
CGF
2010
98views more  CGF 2010»
13 years 8 months ago
Image Synthesis for Branching Structures
We present a set of techniques for the synthesis of artificial images that depict branching structures like rivers, cracks, lightning, mountain ranges, or blood vessels. The centr...
Dominik Sibbing, Darko Pavic, Leif Kobbelt
CGF
2008
160views more  CGF 2008»
13 years 8 months ago
iCheat: A Representation for Artistic Control of Indirect Cinematic Lighting
Thanks to an increase in rendering efficiency, indirect illumination has recently begun to be integrated in cinematic lighting design, an application where physical accuracy is le...
Juraj Obert, Jaroslav Krivánek, Fabio Pella...
« Prev « First page 2445 / 2645 Last » Next »