Publications
-
Constraint-Muse: a Soft-Constraint Based System for Music Therapy
We have developed a prototype tool for interactive music creation, called Constraint Muse, that uses monoidal soft constraints to ensure that a dynamically generated melody harmonizes with input from other…
-
Efficient online learning and prediction of usersā desktop actions
We investigate prediction of usersā desktop activities in the Unix domain. We show that simple efficient many-class learning can perform well for action prediction, significantly improving over previously published results…
-
Frizzled 8 Activation By WNT-2 and Synergistic Up-Regulation in Lung Cancer
-
Gradient-Type Minimization Methods for Initializing State Variables in GPS/Ins Integration
This paper describes an alternative to linear filtering methods for processing a combination of IMU data and GPS data when there is only a limited time to estimate state variables.
-
Introduction to the Special Issue on “Usable AI”
When creating algorithms or systems that are supposed to be used by people, we should be able to adopt a ābinocularā view of usersā interaction with intelligent systems: a view…
-
Processing of Emotional and Alcohol Stimuli in Chronic Alcoholism
-
Studying the Salt Dependence of the Binding of Sigma 70 and Sigma 32 to Core RNA Polymerase Using Luminescence Resonance Energy Transfer
Here we describe an LRET binding assay used to monitor the interaction ofĀ E. coliĀ Ļ70 and Ļ32 with core RNA polymerase along with the controls to verify the system.
-
Testing Aerosol Properties in MODIS Collection 4 and 5 Using Airborne Sunphotometer Observations in INTEX-B/MILAGRO
We compare AATS retrievals of spectral aerosol optical depth (AOD) and related aerosol properties with corresponding spatially coincident and temporally near-coincident measurements acquired by the MODIS-Aqua and MODIS-Terra satellite sensors.
-
The Impact of Smoking Cessation and Pharmacotherapy on Sleep Assessed Across the First 10 Days After Quitting
-
BLADE: Slashing the Invisible Channel of Drive-By Download Malware
We present BLADE (Block All Drive-by download Exploits), a browser-independent system that seeks to eliminate the threat of drive-by downloads, one of the dominant means through which mass malware infections…
-
Designing for Usability of an Adaptive Time Management Assistant
This case study article describes the iterative design process of an adaptive, mixed-initiative calendaring tool with embedded artificial intelligence.Ā
-
Detection of Imperative and Declarative Question-Answer Pairs in Email Conversations
Building on prior work, our methods are based on learned models over a set of features that include the content, context, and structure of email threads.