the proceedings contain 63 papers. the topics discussed include: robustness of CDK2 in triggering cellular senescence based on probability of DNA-damaged cells passing G1/S checkpoint;inferring gene regulatory network...
ISBN:
(纸本)9781457716669
the proceedings contain 63 papers. the topics discussed include: robustness of CDK2 in triggering cellular senescence based on probability of DNA-damaged cells passing G1/S checkpoint;inferring gene regulatory networks from multiple time course gene expression datasets;kinetics of Mullers ratchet from adaptive landscape viewpoint;pathogenesis of axial spondyloarthropathy in a network perspective;extrinsic vs. intrinsic noises in phage lambda genetic switch;detecting b-cell lymphomas dysregulation modules based on molecular interaction network;identifying positional homologs as bidirectional best hits of sequence and gene context similarity;protein interaction prediction for mouse PDZ domains using dipeptide composition features;genomic signatures for metagenomic data analysis: exploiting the reverse complementarity of tetranucleotides;and floral structure and pollination in relation to fruit set in cynanchum otophyllum schneid.
Many software engineering research projects are conducted within university computer science and computing departments or colleges. Every computer or computing department has its own experiences, successes or pitfalls...
详细信息
this book is a collection of papers from the American Ceramic Society's 35thinternationalconference on Advanced Ceramics and Composites, held in Daytona Beach, Florida, January 23-28, 2011. this issue includes p...
详细信息
ISBN:
(数字)9781118172704
ISBN:
(纸本)9781118059937
this book is a collection of papers from the American Ceramic Society's 35thinternationalconference on Advanced Ceramics and Composites, held in Daytona Beach, Florida, January 23-28, 2011. this issue includes papers presented in the 5thinternational Symposium on Advanced Processing and Manufacturing Technologies for Structural and Multifunctional Materials and systems on topics such as Design-Oriented Manufacturing and Novel Forming and Sintering. Papers from a special session held in honor of Katsutoshi Komeya of Yokohama National University, Japan are also included.
Recommender systems have become an important personalization technique on the web and are widely used especially in e-commerce applications. However, operators of web shops and other platforms are challenged by the la...
详细信息
Recommender systems have become an important personalization technique on the web and are widely used especially in e-commerce applications. However, operators of web shops and other platforms are challenged by the large variety of available algorithms and the multitude of their possible parameterizations. Since the quality of the recommendations that are given can have a significant business impact, the selection of a recommender system should be made based on well-founded evaluation data. the literature on recommender system evaluation o?ers a large variety of evaluation metrics but provides little guidance on how to choose among them. this paper focuses on the often neglected aspect of clearly defining the goal of an evaluation and how this goal relates to the selection of an appropriate metric. We discuss several well-known accuracy metrics and analyze how these reflect di?erent evaluation goals. Furthermore we present some less well-known metrics as well as a variation of the area under the curve measure that are particularly suitable for the evaluation of recommender systems in e-commerce applications.
the proceedings contain 5 papers. the topics discussed include: towards explanation-aware social software: applying the mining and analysis continuum of explaining;explanation-aware software design of the semantic sea...
the proceedings contain 5 papers. the topics discussed include: towards explanation-aware social software: applying the mining and analysis continuum of explaining;explanation-aware software design of the semantic search engine KOIOS;providing explanations for the intelligent monitoring of business workflows using case-based reasoning;learning to explain with ABML;and explanations in dialogue systemsthrough uncertain RDF knowledge bases.
the proceedings contain 302 papers. the topics discussed include: a study on distributed parameter free genetic algorithm;fuzzy functional SIRMs inference model;an expert system for medical diagnosis based on fuzzy fu...
the proceedings contain 302 papers. the topics discussed include: a study on distributed parameter free genetic algorithm;fuzzy functional SIRMs inference model;an expert system for medical diagnosis based on fuzzy functional SIRMs inference model;building a knowledge base with temporal memory for modeling of evolving systems;a fast learning algorithm of self-organizing map for law text visualization;application of formal concept analysis for rule mining in artificial neural networks;consideration of context-based designing method for complex-valued reinforcement learning;particle swarm for reinforcement learning;research on 2-leg walking robot;an application of nonlinear PID controllers based on RBFN;neuro-PID control for electric vehicle;evolutionary design of a PID controller using closed-loop data;design of a data-driven IMC-based PID controller;and interactive genetic algorithm with tournament evaluation applying win-loss result presumption by multiple people.
this paper presents a novel low-cost micro air-hockey robotic platform which can be used in the research and development in sensor and networked dynamical system. Comparing with traditional micro soccer robot system, ...
详细信息
ISBN:
(纸本)9780889868748
this paper presents a novel low-cost micro air-hockey robotic platform which can be used in the research and development in sensor and networked dynamical system. Comparing with traditional micro soccer robot system, this new generation of air-hockey robot has an embedded inertial measurement unit. this can be integrated as a part of the sensor fusion for localization of the robot in complement with other information obtained from the imaging system. Moreover, by using a RSSI capable transceiver, this proposed robotic system can be a good platform to develop simultaneous localization and mapping algorithms (SLAM).
Interest in Conotoxin has been rapidly growing over the past number of years due to its potential for effective use in the design of drugs to treat a myriad of conditions including, neuromuscular disorders, chronic pa...
详细信息
the proceedings contain 28 papers. the special focus in this conference is on Information Security theory and practice. the topics include: Securing payment on mobile phones;role-based secure inter-operation and resou...
ISBN:
(纸本)9783642210396
the proceedings contain 28 papers. the special focus in this conference is on Information Security theory and practice. the topics include: Securing payment on mobile phones;role-based secure inter-operation and resource usage management in mobile grid systems;SSL/TLS session-aware user authentication using a GAA bootstrapped key;an almost-optimal forward-private RFID mutual authentication protocol with tag control;affiliation-hiding authentication with minimal bandwidth consumption;formal framework for the evaluation of waveform resynchronization algorithms;solving dlp with auxiliary input over an elliptic curve used in TinyTate library;information leakage discovery techniques to enhance secure chip design;a cryptographic processor for low-resource devices: canning ECDSA and AES like sardines;an evaluation of hash functions on a power analysis resistant processor architecture;a comparison of post-processing techniques for biased random number generators;AES variants secure against related-key differential and boomerang attacks;leakage squeezing countermeasure against high-order attacks;differential fault analysis of the advanced encryption standard using a single fault;entropy of selectively encrypted strings;practical attacks on HB and HB+ protocols;attacks on a lightweight mutual authentication protocol under EPC C-1 G-2 standard;a SMS-Based mobile botnet using flooding algorithm;fault injection for reverse engineering;hardware Trojan side-channels based on physical unclonable functions;formal analysis of security metrics and risk;STORM - collaborative security management environment;trust agreement in wireless mesh networks and secure E-Auction for mobile users with low-capability devices in wireless network.
暂无评论