Sciweavers

8381 search results - page 1632 / 1677
» The security of machine learning
Sort
View
FUZZIEEE
2007
IEEE
15 years 4 months ago
Mining and Predicting CpG islands
— A DNA sequence can be described as a string composed of four symbols: A, T, C and G. Each symbol represents a chemically distinct nucleotide molecule. Combinations of two nucle...
Christopher Previti, Oscar Harari, Coral del Val
ECTEL
2007
Springer
15 years 4 months ago
Network Analysis of Repositories
In the paper an approach to analysis of the structure of repositories based on network analysis is proposed. The repository metadata can be transformed into several (one-mode or tw...
Vladimir Batagelj, Iztok Kavkler, Matija Lokar
ECTEL
2007
Springer
15 years 4 months ago
Reflections on Digital Literacy
Parallel to the societal diffusion of digital technologies, the debate on their impacts and requirements has created terms like ICT literacy, digital literacy or digital competenc...
Harald Gapski
95
Voted
EDUTAINMENT
2007
Springer
15 years 4 months ago
A Hybrid of Plot-Based and Character-Based Interactive Storytelling
Interactive storytelling in the virtual environment attracts a lot of research interests in recent years. Story plot and character are two most important elements of a story. Based...
Yundong Cai, Chunyan Miao, Ah-Hwee Tan, Zhiqi Shen
IWDW
2007
Springer
15 years 4 months ago
Steganalysis Versus Splicing Detection
Aiming at detecting secret information hidden in a given image using steganographic tools, steganalysis has been of interest since the end of 1990’s. In particular, universal ste...
Yun Q. Shi, Chunhua Chen, Guorong Xuan, Wei Su
« Prev « First page 1632 / 1677 Last » Next »