Results 1 - 10
of
880
Interaction and Outeraction: Instant Messaging in Action
, 2000
"... We discuss findings from an ethnographic study of instant messaging (IM) in the workplace and its implications for media theory. We describe how instant messaging supports a variety of informal communication tasks. We document the affordances of IM that support flexible, expressive communication. We ..."
Abstract
-
Cited by 414 (12 self)
- Add to MetaCart
. We describe some unexpected uses of IM that highlight aspects of communication which are not part of current media theorizing. They pertain to communicative processes people use to connect with each other and to manage communication, rather than to information exchange. We call these processes "
SOME UNEXPECTED ASPECTS IN THE X-RAY STRUCTURE OF THE CYTOCHROME b6f COMPLEX
"... Structures of the cytochrome b6 f complex obtained at 3.0-3.1 Å resolution from the thermophilic cyanobacterium, Mastigocladis laminosus, [1] and the green alga, Chlamydomonas reinhardtii [2] whose appearance in evolution is separated by 10 9 years, are almost identical. Two monomers of molecular we ..."
Abstract
- Add to MetaCart
Structures of the cytochrome b6 f complex obtained at 3.0-3.1 Å resolution from the thermophilic cyanobacterium, Mastigocladis laminosus, [1] and the green alga, Chlamydomonas reinhardtii [2] whose appearance in evolution is separated by 10 9 years, are almost identical. Two monomers of molecular weight 110,000, containing eight subunits and seven natural prosthetic groups, are separated by a large lipid-containing “quinone exchange cavity. ” A unique heme, heme x, that is 4- or 5-coordinate and necessarily high spin, with no strong field ligand, is electronically wired to a propionate of the intra-membrane heme bn by a water or hydroxyl. This position is filled by the n-side bound quinone, Qn, in the cytochrome bc1 complex of the mitochondrial respiratory chain. Heme x has been found to be a rhombic high spin ferric heme. The structure and position of heme x suggests that it could function in ferredoxin-dependent cyclic electron transport as well as being an intermediate in a quinone cycle mechanism for electron and proton transfer, although its high spin character is an enigma. Small, but significant differences between the cyanobacterial and algal complexes are: (i) on
International Journal of Pattern Recognition and Artificial Intelligence c ○ World Scientific Publishing Company The unexpected aspects of surprise
"... Some symbolic AI models for example BDI (belief, desire, intention) models are conceived as explicit and operational models of the intentional pursuit and belief dynamics. The main concern of these models is to provide a clear understanding of the functional roles of different kinds of epistemic and ..."
Abstract
- Add to MetaCart
Some symbolic AI models for example BDI (belief, desire, intention) models are conceived as explicit and operational models of the intentional pursuit and belief dynamics. The main concern of these models is to provide a clear understanding of the functional roles of different kinds of epistemic and motivational states (beliefs, acceptances, expectations, intentions, goals, desires etc...), of the relational properties among them. Mental configurations of appraisal (involving different kinds of motivational and epistemic states) which correspond to particular cognitive emotions such as disappointment, fear, relief, shame etc... have been analyzed by several authors close to the BDI theoretical tradition. The main objective of this work is a formal analysis of Surprise in a BDI-like cognitive architecture. A clarification of the functional role of Surprise in a BDI-like cognitive architecture with respect to resource bounded belief revision is given.
Efficient Algorithms for Mining Outliers from Large Data Sets
, 2000
"... In this paper, we propose a novel formulation for distance-based outliers that is based on the distance of a point from its k th nearest neighbor. We rank each point on the basis of its distance to its k th nearest neighbor and declare the top n points in this ranking to be outliers. In addition ..."
Abstract
-
Cited by 322 (0 self)
- Add to MetaCart
several expected and unexpected aspects of the database. The results from a study on synthetic data sets demonstrate that the partition-based algorithm scales well with respect to both data set size and data set dimensionality.
The M5 simulator: Modeling networked systems
- IEEE Micro
, 2006
"... TCP/IP networking is an increasingly important aspect of computer systems, but a lack of simulation tools limits architects ’ ability to explore new designs for network I/O. We have developed the M5 simulator specif-ically to enable research in this area. In addition to typical architecture simulato ..."
Abstract
-
Cited by 249 (22 self)
- Add to MetaCart
TCP/IP networking is an increasingly important aspect of computer systems, but a lack of simulation tools limits architects ’ ability to explore new designs for network I/O. We have developed the M5 simulator specif-ically to enable research in this area. In addition to typical architecture
Unexpected Discoveries And S-Invention Of Design Requirements: A Key To Creative Designs
- UNIVERSITY OF SYDNEY
, 1999
"... The creative outcome of a design process hinges on whether or not designers are able to find important aspects of a given problem and thereby invent design issues or requirements during the process. How do they do this? What becomes the impetus for the invention of important issues or requirements? ..."
Abstract
-
Cited by 125 (43 self)
- Add to MetaCart
The creative outcome of a design process hinges on whether or not designers are able to find important aspects of a given problem and thereby invent design issues or requirements during the process. How do they do this? What becomes the impetus for the invention of important issues or requirements
Protecting against unexpected system calls
- In Proceedings of the 14th USENIX Security Symposium
, 2005
"... This paper proposes a comprehensive set of techniques which limit the scope of remote code injection attacks. These techniques prevent any injected code from making system calls and thus restrict the capabilities of an attacker. In defending against the traditional ways of harming a system these tec ..."
Abstract
-
Cited by 24 (0 self)
- Add to MetaCart
these techniques significantly raise the bar for compromising the host system forcing the attack code to take extraordinary steps that may be impractical in the context of a remote code injection attack. There are two main aspects to our approach. The first is to embed semantic information into executables
Teaching Technical Communication - Unexpected Experience
, 2001
"... In 1998, a course on technical communication was introduced at the Faculty of Electronics and Information Technology, Warsaw University of Technology. Some of its characteristic features are: (a) the course has been developed and taught by a team of a university professor and a senior engineer from ..."
Abstract
- Add to MetaCart
from a marketing division of a large industrial company; (b) the lectures cover several non-traditional topics, such as "Internet as a source of information" and "legal and ethical aspects of technical writing"; (c) self- and peer-reviewing of student assignments is employed. Our
Unexpected Variation in Neuroanatomy among Diverse
, 2015
"... Nematodes are considered excellent models for understanding fundamental aspects of neuron function. However, nematodes are less frequently used as models for examining the evolution of nervous systems. While the habitats and behaviors of nematodes are diverse, the neuroanatomy of nematodes is often ..."
Abstract
- Add to MetaCart
Nematodes are considered excellent models for understanding fundamental aspects of neuron function. However, nematodes are less frequently used as models for examining the evolution of nervous systems. While the habitats and behaviors of nematodes are diverse, the neuroanatomy of nematodes is often
Identifying Unexpected Therapeutic Targets via
, 2009
"... Drug medications inevitably affect not only their intended protein targets but also other proteins as well. In this study we examined the hypothesis that drugs that share the same therapeutic effect also share a common therapeutic mechanism by targeting not only known drug targets, but also by inter ..."
Abstract
- Add to MetaCart
by interacting unexpectedly on the same cryptic targets. By constructing and mining an Alzheimer’s disease (AD) drug-oriented chemical-protein interactome (CPI) using a matrix of 10 drug molecules known to treat AD towards 401 human protein pockets, we found that such cryptic targets exist. We recovered from CPI
Results 1 - 10
of
880