Sciweavers

524 search results - page 100 / 105
» Why phishing works
Sort
View
BMCBI
2007
141views more  BMCBI 2007»
13 years 9 months ago
On the origin and evolution of biosynthetic pathways: integrating microarray data with structure and organization of the Common
Background: The lysine, threonine, and methionine biosynthetic pathways share the three initial enzymatic steps, which are referred to as the Common Pathway (CP). In Escherichia c...
Marco Fondi, Matteo Brilli, Renato Fani
IJHCI
2008
92views more  IJHCI 2008»
13 years 9 months ago
Coupling the Users: The Benefits of Paired User Testing for iDTV
Interactive digital television (iDTV) is a social medium and must therefore be tested in a context as close to real life as possible. This explains why we saw the potential and im...
Tara Shrimpton-Smith, Bieke Zaman, David Geerts
JAIR
2008
171views more  JAIR 2008»
13 years 9 months ago
AND/OR Multi-Valued Decision Diagrams (AOMDDs) for Graphical Models
Inspired by AND/OR search spaces for graphical models recently introduced, we propose to augment Multi-Valued Decision Diagrams (MDD) with AND nodes, in order to capture function ...
Robert Mateescu, Rina Dechter, Radu Marinescu 0002
ECCC
2007
127views more  ECCC 2007»
13 years 9 months ago
Universal Semantic Communication I
Is it possible for two intelligent beings to communicate meaningfully, without any common language or background? This question has interest on its own, but is especially relevant...
Brendan Juba, Madhu Sudan
MCS
2008
Springer
13 years 9 months ago
On the stability analysis of nonlinear systems using polynomial Lyapunov functions
In the stability study of nonlinear systems, not to found feasible solution for the LMI problem associated with a quadratic Lyapunov function shows that it doesn't exist posi...
Hajer Bouzaouache, Naceur Benhadj Braiek