Sciweavers

242 search results - page 13 / 49
» Provenance for Computational Tasks: A Survey
Sort
View
ICPR
2006
IEEE
15 years 11 months ago
Combining Cepstral and Prosodic Features in Language Identification
A novel approach of combining cepstral features and prosodic features in language identification is presented in this paper. This combination approach shows a significant improvem...
Bo Yin, Eliathamby Ambikairajah, Fang Chen
CVPR
2011
IEEE
14 years 6 months ago
Sparse Image Representation with Epitomes
Sparse coding, which is the decomposition of a vector using only a few basis elements, is widely used in machine learning and image processing. The basis set, also called dictiona...
Louise Benoit, Julien Mairal, Francis Bach, Jean P...
CHI
2010
ACM
15 years 4 months ago
Are your participants gaming the system?: screening mechanical turk workers
In this paper we discuss a screening process used in conjunction with a survey administered via Amazon.com’s Mechanical Turk. We sought an easily implementable method to disqual...
Julie S. Downs, Mandy B. Holbrook, Steve Sheng, Lo...
BMCBI
2010
165views more  BMCBI 2010»
14 years 10 months ago
MTar: a computational microRNA target prediction architecture for human transcriptome
Background: MicroRNAs (miRNAs) play an essential task in gene regulatory networks by inhibiting the expression of target mRNAs. As their mRNA targets are genes involved in importa...
Vinod Chandra, Reshmi Girijadevi, Achuthsankar S. ...
STOC
2004
ACM
153views Algorithms» more  STOC 2004»
15 years 10 months ago
Bounded-concurrent secure multi-party computation with a dishonest majority
We show how to securely realize any multi-party functionality in a way that preserves security under an a-priori bounded number of concurrent executions, regardless of the number ...
Rafael Pass