Sciweavers

704 search results - page 114 / 141
» A Randomized Method for Integrated Exploration
Sort
View
88
Voted
CAV
2001
Springer
119views Hardware» more  CAV 2001»
15 years 2 months ago
Certifying Model Checkers
Model Checking is an algorithmic technique to determine whether a temporal property holds of a program. For linear time properties, a model checker produces a counterexample comput...
Kedar S. Namjoshi
80
Voted
BIS
2008
114views Business» more  BIS 2008»
14 years 11 months ago
Transforming Exchange-based Job Boards into Lasting Career Communities
Abstract. In this paper, we use a qualitative approach to explore which design aspects an erecruiting platform requires so as to achieve active long-term participation of its users...
Elfi Ettinger, Celeste Wilderom, Rolf Van Dick
CMG
2001
14 years 11 months ago
Software That Can Think and Do
Rapid advances in research and technology now allow data analysis and modeling of extremely complex systems. Methods from artificial intelligence (AI) such as Neural Networks have...
Bernard Domanski
BMCBI
2006
142views more  BMCBI 2006»
14 years 9 months ago
RDMAS: a web server for RNA deleterious mutation analysis
Background: The diverse functions of ncRNAs critically depend on their structures. Mutations in ncRNAs disrupting the structures of functional sites are expected to be deleterious...
Wenjie Shu, Xiaochen Bo, Rujia Liu, Dongsheng Zhao...
ICML
2005
IEEE
15 years 10 months ago
Q-learning of sequential attention for visual object recognition from informative local descriptors
This work provides a framework for learning sequential attention in real-world visual object recognition, using an architecture of three processing stages. The first stage rejects...
Lucas Paletta, Gerald Fritz, Christin Seifert