Sciweavers

2648 search results - page 408 / 530
» Human Factors In Computer Security
Sort
View
MM
2010
ACM
163views Multimedia» more  MM 2010»
14 years 10 months ago
Multi-exposure imaging on mobile devices
Many natural scenes have a dynamic range that is larger than the dynamic range of a camera's image sensor. A popular approach to producing an image without under- and over-ex...
Natasha Gelfand, Andrew Adams, Sung Hee Park, Kari...
BICOB
2010
Springer
14 years 10 months ago
Integrative Biomarker Discovery for Breast Cancer Metastasis from Gene Expression and Protein Interaction Data Using Error-toler
Biomarker discovery for complex diseases is a challenging problem. Most of the existing approaches identify individual genes as disease markers, thereby missing the interactions a...
Rohit Gupta, Smita Agrawal, Navneet Rao, Ze Tian, ...
TMC
2008
164views more  TMC 2008»
14 years 10 months ago
Coupons: A Multilevel Incentive Scheme for Information Dissemination in Mobile Networks
Integrating mobile computing and localized user interaction into the Internet requires more than simply overcoming pure routing challenges. Apart from issues such as intermittent c...
Anargyros Garyfalos, Kevin C. Almeroth
TSMC
1998
96views more  TSMC 1998»
14 years 9 months ago
The MDS-ANAVA technique for assessing knowledge representation differences between skill groups
—Knowledge representation is one of important factors that determine human performance on cognitive tasks. Due to different levels of experience, different groups of people may d...
Nong Ye
SAC
2008
ACM
14 years 9 months ago
Adding background knowledge to formal concept analysis via attribute dependency formulas
We present a way to add user's background knowledge to formal concept analysis. The type of background knowledge we deal with relates to relative importance of attributes in ...
Radim Belohlávek, Vilém Vychodil