Sciweavers

557 search results - page 100 / 112
» Two experiences designing for effective security
Sort
View
CHI
2009
ACM
16 years 2 months ago
EyeSpy: supporting navigation through play
This paper demonstrates how useful content can be generated as a by-product of an enjoyable mobile multiplayer game. In EyeSpy, players tag geographic locations with photos or tex...
Marek Bell, Stuart Reeves, Barry Brown, Scott Sher...
GECCO
2004
Springer
140views Optimization» more  GECCO 2004»
15 years 7 months ago
Keeping the Diversity with Small Populations Using Logic-Based Genetic Programming
We present a new method of Logic-Based Genetic Programming (LBGP). Using the intrinsic mechanism of backtracking in Prolog, we utilize large individual programs with redundant clau...
Ken Taniguchi, Takao Terano
134
Voted
MIDDLEWARE
2004
Springer
15 years 7 months ago
Toward a standard ubiquitous computing framework
This paper surveys a variety of subsystems designed to be the building blocks from which sophisticated infrastructures for ubiquitous computing are assembled. Our experience shows...
Martin Modahl, Bikash Agarwalla, Gregory D. Abowd,...
129
Voted
BMCBI
2007
174views more  BMCBI 2007»
15 years 1 months ago
Normalization method for metabolomics data using optimal selection of multiple internal standards
Background: Success of metabolomics as the phenotyping platform largely depends on its ability to detect various sources of biological variability. Removal of platform-specific so...
Marko Sysi-Aho, Mikko Katajamaa, Laxman Yetukuri, ...
116
Voted
ECCV
2006
Springer
16 years 3 months ago
Conditional Infomax Learning: An Integrated Framework for Feature Extraction and Fusion
The paper introduces a new framework for feature learning in classification motivated by information theory. We first systematically study the information structure and present a n...
Dahua Lin, Xiaoou Tang