Sciweavers

5684 search results - page 306 / 1137
» Computing with active dendrites
Sort
View
SP
2010
IEEE
178views Security Privacy» more  SP 2010»
15 years 8 months ago
Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically
The computer systems security arms race between attackers and defenders has largely taken place in the domain of software systems, but as hardware complexity and design processes ...
Matthew Hicks, Murph Finnicum, Samuel T. King, Mil...
BIRD
2008
Springer
15 years 6 months ago
Translational Control by RNA-RNA Interaction: Improved Computation of RNA-RNA Binding Thermodynamics
The thermodynamics of RNA-RNA interaction consists of two components: the energy necessary to make a potential binding region accessible, i.e., unpaired, and the energy gained from...
Ulrike Mückstein, Hakim Tafer, Stephan H. F. ...
LREC
2008
153views Education» more  LREC 2008»
15 years 6 months ago
The ACL Anthology Reference Corpus: A Reference Dataset for Bibliographic Research in Computational Linguistics
The ACL Anthology is a digital archive of conference and journal papers in natural language processing and computational linguistics. Its primary purpose is to serve as a referenc...
Steven Bird, Robert Dale, Bonnie J. Dorr, Bryan Gi...
NIPS
2007
15 years 6 months ago
Invariant Common Spatial Patterns: Alleviating Nonstationarities in Brain-Computer Interfacing
Brain-Computer Interfaces can suffer from a large variance of the subject conditions within and across sessions. For example vigilance fluctuations in the individual, variable ta...
Benjamin Blankertz, Motoaki Kawanabe, Ryota Tomiok...
IJCAI
1997
15 years 6 months ago
Machine Learning Techniques to Make Computers Easier to Use
Identifying user-dependent information that can be automatically collected helps build a user model by which 1) to predict what the user wants to do next and 2) to do relevant pre...
Hiroshi Motoda, Kenichi Yoshida