Sciweavers

256 search results - page 48 / 52
» Using groups for investigating rewrite systems
Sort
View
SOUPS
2010
ACM
15 years 1 months ago
Folk models of home computer security
Home computer systems are frequently insecure because they are administered by untrained, unskilled users. The rise of botnets has amplified this problem; attackers can compromis...
Rick Wash
GECCO
2009
Springer
111views Optimization» more  GECCO 2009»
15 years 4 months ago
Evolving quorum sensing in digital organisms
For centuries it was thought that bacteria live asocial lives. However, recent discoveries show many species of bacteria communicate in order to perform tasks previously thought t...
Benjamin E. Beckmann, Philip K. McKinley
NIPS
2000
14 years 10 months ago
One Microphone Source Separation
Source separation, or computational auditory scene analysis, attempts to extract individual acoustic objects from input which contains a mixture of sounds from different sources, ...
Sam T. Roweis
EACL
1989
ACL Anthology
14 years 10 months ago
A rich environment for experimentation with unification grammars
This paper describes some of the features of a sophisticated language and environment designed for experimentation with unification-oriented linguistic descriptions. The system, w...
Rod L. Johnson, Mike Rosner
KDD
2009
ACM
159views Data Mining» more  KDD 2009»
15 years 10 months ago
Mining brain region connectivity for alzheimer's disease study via sparse inverse covariance estimation
Effective diagnosis of Alzheimer's disease (AD), the most common type of dementia in elderly patients, is of primary importance in biomedical research. Recent studies have de...
Liang Sun, Rinkal Patel, Jun Liu, Kewei Chen, Tere...