Sciweavers

1518 search results - page 138 / 304
» Cryptographic Test Correction
Sort
View
INTERACT
1997
15 years 5 months ago
Usability Engineering in Industrial Practice
ABSTRACT Do developers use proven usability techniques like user involvement, usability testing, and iterative design in industrial practice? Based on inside knowledge of many diff...
Søren Lauesen
CSL
2006
Springer
15 years 3 months ago
Adaptation of maximum entropy capitalizer: Little data can help a lot
A novel technique for maximum "a posteriori" (MAP) adaptation of maximum entropy (MaxEnt) and maximum entropy Markov models (MEMM) is presented. The technique is applied...
Ciprian Chelba, Alex Acero
JBI
2008
159views Bioinformatics» more  JBI 2008»
15 years 3 months ago
SEGS: Search for enriched gene sets in microarray data
Gene Ontology (GO) terms are often used to interpret the results of microarray experiments. The most common approach is to perform Fisher's exact tests to find gene sets anno...
Igor Trajkovski, Nada Lavrac, Jakub Tolar
137
Voted
JCS
2008
109views more  JCS 2008»
15 years 3 months ago
Secrecy for bounded security protocols with freshness check is NEXPTIME-complete
The secrecy problem for security protocols is the problem to decide whether or not a given security protocol has leaky runs. In this paper, the (initial) secrecy problem for bound...
Ferucio Laurentiu Tiplea, Catalin V. Birjoveanu, C...
AI
2002
Springer
15 years 3 months ago
Learning Bayesian networks from data: An information-theory based approach
This paper provides algorithms that use an information-theoretic analysis to learn Bayesian network structures from data. Based on our three-phase learning framework, we develop e...
Jie Cheng, Russell Greiner, Jonathan Kelly, David ...