Sciweavers

4340 search results - page 854 / 868
» Formal Methods and Cryptography
Sort
View
ISMB
2000
15 years 1 months ago
Mining for Putative Regulatory Elements in the Yeast Genome Using Gene Expression Data
We have developed a set of methods and tools for automatic discovery of putative regulatory signals in genome sequences. The analysis pipeline consists of gene expression data clu...
Jaak Vilo, Alvis Brazma, Inge Jonassen, Alan J. Ro...
ACL
1994
15 years 1 months ago
Priority Union and Generalization in Discourse Grammars
We describe an implementation in Carpenter's typed feature formalism, ALE, of a discourse grammar of the kind proposed by Scha, Polanyi, et al. We examine their method for re...
Claire Grover, Chris Brew, Suresh Manandhar, Marc ...
COLING
1992
15 years 26 days ago
The Proper Treatment Of Word Order In HPSG
: This paper describes a possibility of expressing ordering constraints among non-sister constituents in binary branching syntactic structures on a local basis, supported by viewin...
Karel Oliva
TAMODIA
2007
15 years 26 days ago
Exploring Usability Needs by Human-Computer Interaction Patterns
Abstract. Covering quality aspects such as usability through the software development life cycle is challenging. These “-ilities” are generally difficult to grasp and usually ...
Markus Specker, Ina Wentzlaff
ATAL
2010
Springer
15 years 25 days ago
Planning against fictitious players in repeated normal form games
Planning how to interact against bounded memory and unbounded memory learning opponents needs different treatment. Thus far, however, work in this area has shown how to design pla...
Enrique Munoz de Cote, Nicholas R. Jennings