Security software is often difficult to use thus leading to poor adoption and degraded security. This paper describes a usability study that was conducted on the software ‘Polar...
Despite the existence of a number of procedures for real-parameter optimization using evolutionary algorithms, there is still a need of a systematic and unbiased comparison of diï...
Predicting and proper ranking of splice sites (SS) is a challenging problem in bioinformatics and machine learning communities. Proposed method of donor and acceptor SSs predictio...
Over the past decades, large organisations have developed increasingly complex portfolios of information systems to support business processes. Maintenance and leveraging of these...
In this paper, we incorporate a set of principles originated from cognitive psychology into the design of 3-D shape analysis and retrieval algorithms. Based on the “visual salie...
Hsueh-Yi Sean Lin, Hong-Yuan Mark Liao, Ja-Chen Li...