Sciweavers

5722 search results - page 538 / 1145
» Security Function Interactions
Sort
View
88
Voted
ICEC
1994
37views more  ICEC 1994»
15 years 6 months ago
A Method for Utilizing Diploid/Dominance in Genetic Search
homologous alleles seemingly compete prior to manifestation in the observed phenotype, will be referred to as sub-phenotype interaction.A method is proposed for implementing diploi...
F. Greene
137
Voted
ASSETS
2010
ACM
15 years 5 months ago
Leveraging proprioception to make mobile phones more accessible to users with visual impairments
Accessing the advanced functions of a mobile phone is not a trivial task for users with visual impairments. They rely on screen readers and voice commands to discover and execute ...
Frank Chun Yat Li, David Dearman, Khai N. Truong
BIOSYSTEMS
2007
109views more  BIOSYSTEMS 2007»
15 years 5 months ago
Protein folding and the robustness of cells
The intricate intracellular infrastructure of all known life forms is based on proteins. The folded shape of a protein determines both the protein’s function and the set of mole...
G. J. Shawn Tan, Ferran D. Revilla, Klaus-Peter Za...
136
Voted
JOCN
2010
68views more  JOCN 2010»
15 years 3 months ago
Shared Neural Circuits for Mentalizing about the Self and Others
■ Although many examples exist for shared neural representations of self and other, it is unknown how such shared representations interact with the rest of the brain. Furthermor...
Michael V. Lombardo, Bhismadev Chakrabarti, Edward...
174
Voted
CDC
2010
IEEE
122views Control Systems» more  CDC 2010»
15 years 2 days ago
Extremal collective behavior
Abstract-- Curves and natural frames can be used for describing and controlling motion in both biological and engineering contexts (e.g., pursuit and formation control). The geomet...
Eric W. Justh, P. S. Krishnaprasad