Sciweavers

119 search results - page 15 / 24
» Three related types of multi-value association patterns
Sort
View
USS
2010
13 years 5 months ago
VEX: Vetting Browser Extensions for Security Vulnerabilities
The browser has become the de facto platform for everyday computation. Among the many potential attacks that target or exploit browsers, vulnerabilities in browser extensions have...
Sruthi Bandhakavi, Samuel T. King, P. Madhusudan, ...
TVCG
2011
168views more  TVCG 2011»
13 years 2 months ago
The Effect on Lower Spine Muscle Activation of Walking on a Narrow Beam in Virtual Reality
— To what extent do people behave in immersive virtual environments as they would in similar situations in a physical environment? There are many ways to address this question, r...
Angus Antley, Mel Slater
BMCBI
2008
93views more  BMCBI 2008»
13 years 7 months ago
MPDA: Microarray pooled DNA analyzer
Background: Microarray-based pooled DNA experiments that combine the merits of DNA pooling and gene chip technology constitute a pivotal advance in biotechnology. This new techniq...
Hsin-Chou Yang, Mei-Chu Huang, Ling-Hui Li, Chien-...
ESANN
2007
13 years 9 months ago
Structured reservoir computing with spatiotemporal chaotic attractors
Abstract. We approach the themes “computing with chaos” and “reservoir computing” in a unified setting. Different neural architectures are mentioned which display chaotic...
Carlos Lourenço
BMCBI
2010
111views more  BMCBI 2010»
13 years 7 months ago
Functional Analysis: Evaluation of Response Intensities - Tailoring ANOVA for Lists of Expression Subsets
Background: Microarray data is frequently used to characterize the expression profile of a whole genome and to compare the characteristics of that genome under several conditions....
Fabrice Berger, Bertrand De Meulder, Anthoula Gaig...