Sciweavers

3818 search results - page 701 / 764
» Word Problems on Compressed Words
Sort
View
CHI
2006
ACM
16 years 4 months ago
Error correction of voicemail transcripts in SCANMail
Despite its widespread use, voicemail presents numerous usability challenges: People must listen to messages in their entirety, they cannot search by keywords, and audio files do ...
Moira Burke, Brian Amento, Philip L. Isenhour
CHI
2005
ACM
16 years 4 months ago
Connecting with kids: so what's new?
From pre-schools to high schools, at home and in museums, the educational community has embraced the use of computers as a teaching tool. Yet many institutions will simply install...
Lori L. Scarlatos, Amy Bruckman, Allison Druin, Mi...
126
Voted
RECOMB
2002
Springer
16 years 4 months ago
Phase-independent rhythmic analysis of genome-wide expression patterns
We introduce a model-based analysis technique for extracting and characterizing rhythmic expression pro les from genome-wide DNA microarray hybridization data. These patterns are ...
Christopher James Langmead, Anthony K. Yan, C. Rob...
132
Voted
STOC
2007
ACM
140views Algorithms» more  STOC 2007»
16 years 4 months ago
On the submodularity of influence in social networks
We prove and extend a conjecture of Kempe, Kleinberg, and Tardos (KKT) on the spread of influence in social networks. A social network can be represented by a directed graph where...
Elchanan Mossel, Sébastien Roch
242
Voted
VLDB
2008
ACM
148views Database» more  VLDB 2008»
16 years 4 months ago
Purpose based access control for privacy protection in relational database systems
Abstract In this article, we present a comprehensive approach for privacy preserving access control based on the notion of purpose. In our model, purpose information associated wit...
Ji-Won Byun, Ninghui Li