Sciweavers

5302 search results - page 1011 / 1061
» Learning How to Separate
Sort
View
CHI
2009
ACM
16 years 12 days ago
Designing for discovery: opening the hood for open-source end user tinkering
According to the Free Software Movement, the user ought to have "the freedoms to make changes, and to publish improved versions" and "to study how the program works...
Gifford Cheung, Parmit Chilana, Shaun K. Kane, Bra...
PKC
2009
Springer
210views Cryptology» more  PKC 2009»
16 years 11 days ago
Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials
In this work, we consider the task of allowing a content provider to enforce complex access control policies on oblivious protocols conducted with anonymous users. As our primary ...
Scott E. Coull, Matthew Green, Susan Hohenberger
KDD
2007
ACM
209views Data Mining» more  KDD 2007»
16 years 7 days ago
Temporal causal modeling with graphical granger methods
The need for mining causality, beyond mere statistical correlations, for real world problems has been recognized widely. Many of these applications naturally involve temporal data...
Andrew Arnold, Yan Liu, Naoki Abe
RECOMB
2006
Springer
16 years 4 days ago
Detecting MicroRNA Targets by Linking Sequence, MicroRNA and Gene Expression Data
MicroRNAs (miRNAs) have recently been discovered as an important class of non-coding RNA genes that play a major role in regulating gene expression, providing a means to control th...
Jim C. Huang, Quaid Morris, Brendan J. Frey
HRI
2009
ACM
15 years 6 months ago
Providing route directions: design of robot's utterance, gesture, and timing
Providing route directions is a complicated interaction. Utterances are combined with gestures and pronounced with appropriate timing. This study proposes a model for a robot that...
Yusuke Okuno, Takayuki Kanda, Michita Imai, Hirosh...
« Prev « First page 1011 / 1061 Last » Next »