Sciweavers

4702 search results - page 216 / 941
» How to Copyright a Function
Sort
View
ICML
2004
IEEE
16 years 5 months ago
Adaptive cognitive orthotics: combining reinforcement learning and constraint-based temporal reasoning
Reminder systems support people with impaired prospective memory and/or executive function, by providing them with reminders of their functional daily activities. We integrate tem...
Matthew R. Rudary, Satinder P. Singh, Martha E. Po...
RECOMB
2009
Springer
16 years 5 months ago
Evaluating Between-Pathway Models with Expression Data
Abstract. Between-Pathway Models (BPMs) are network motifs consisting of pairs of putative redundant pathways. In this paper, we show how adding another source of high-throughput d...
Benjamin J. Hescott, Mark D. M. Leiserson, Lenore ...
ESA
2009
Springer
130views Algorithms» more  ESA 2009»
15 years 11 months ago
On the Performance of Approximate Equilibria in Congestion Games
We study the performance of approximate Nash equilibria for congestion games with polynomial latency functions. We consider how much the price of anarchy worsens and how much the ...
George Christodoulou, Elias Koutsoupias, Paul G. S...
TABLETOP
2008
IEEE
15 years 11 months ago
Contextual design considerations for co-located, collaborative tables
To date, digital tabletop research has predominantly focused on resolving fundamental software and hardware challenges introduced by this new interactive platform. Understanding n...
James R. Wallace, Stacey D. Scott
125
Voted
ISW
2007
Springer
15 years 11 months ago
Specifying Imperative Data Obfuscations
Abstract. An obfuscation aims to transform a program, without affecting the functionality, so that some secret information within the program can be hidden for as long as possible...
Stephen Drape, Clark D. Thomborson, Anirban Majumd...