Sciweavers

12493 search results - page 2269 / 2499
» Information Access in the Web
Sort
View
122
Voted
ICIA
2007
15 years 4 months ago
Modeling Human-Agent Interaction with Active Ontologies
As computer systems continue to grow in power and access more networked content and services, we believe there will be an increasing need to provide more user-centric systems that...
Didier Guzzoni, Charles Baur, Adam Cheyer
102
Voted
WSC
2007
15 years 4 months ago
Combining micro and macro-modeling in DEVS for computational biology
In computational biology there is an increasing need to combine micro and macro views of the system of interest. Therefore, explicit means to describe micro and macro level and th...
Adelinde M. Uhrmacher, Roland Ewald, Mathias John,...
USS
2008
15 years 4 months ago
Modeling the Trust Boundaries Created by Securable Objects
One of the most critical steps of any security review involves identifying the trust boundaries that an application is exposed to. While methodologies such as threat modeling can ...
Matt Miller
ACSC
2008
IEEE
15 years 3 months ago
An investigation of the state formation and transition limitations for prediction problems in recurrent neural networks
Recurrent neural networks are able to store information about previous as well as current inputs. This "memory" allows them to solve temporal problems such as language r...
Angel Kennedy, Cara MacNish
ASSETS
2008
ACM
15 years 3 months ago
Refreshable tactile graphics applied to schoolbook illustrations for students with visual impairment
This article presents research on making schoolbook illustrations accessible for students with visual impairment. The MaskGen system was developed to interactively transpose illus...
Grégory Petit, Aude Dufresne, Vincent L&eac...
« Prev « First page 2269 / 2499 Last » Next »