Sciweavers

165 search results - page 32 / 33
» Why Machine Ethics
Sort
View
CCS
2010
ACM
13 years 10 months ago
Attacks and design of image recognition CAPTCHAs
We systematically study the design of image recognition CAPTCHAs (IRCs) in this paper. We first review and examine all IRCs schemes known to us and evaluate each scheme against th...
Bin B. Zhu, Jeff Yan, Qiujie Li, Chao Yang, Jia Li...
COR
2006
138views more  COR 2006»
13 years 9 months ago
Deconstructing Nowicki and Smutnicki's i-TSAB tabu search algorithm for the job-shop scheduling problem
Over the last decade and a half, tabu search algorithms for machine scheduling have gained a near-mythical reputation by consistently equaling or establishing state-of-the-art per...
Jean-Paul Watson, Adele E. Howe, L. Darrell Whitle...
BMCBI
2005
132views more  BMCBI 2005»
13 years 9 months ago
Correlation and prediction of gene expression level from amino acid and dipeptide composition of its protein
Background: A large number of papers have been published on analysis of microarray data with particular emphasis on normalization of data, detection of differentially expressed ge...
Gajendra P. S. Raghava, Joon H. Han
COLING
2002
13 years 9 months ago
The LinGO Redwoods Treebank: Motivation and Preliminary Applications
The LinGO Redwoods initiative is a seed activity in the design and development of a new type of treebank. While several medium- to large-scale treebanks exist for English (and for...
Stephan Oepen, Kristina Toutanova, Stuart M. Shieb...
COMPUTER
2002
103views more  COMPUTER 2002»
13 years 9 months ago
SimpleScalar: An Infrastructure for Computer System Modeling
tail defines the level of abstraction used to implement the model's components. A highly detailed model will faithfully simulate all aspects of machine operation, whether or n...
Todd M. Austin, Eric Larson, Dan Ernst