Visual Strategies for Guiding Gaze Sequences and Attention in Yi Symbols: Eye-Tracking Insights. [PDF]
Yuan B, Teeravarunyou S.
europepmc +1 more source
Prior knowledge on context-driven DNA fragmentation probabilities can improve de novo genome assembly algorithms. [PDF]
Pflughaupt P, Sahakyan AB.
europepmc +1 more source
What's in a pun? Assessing the relationship between phonological distance and perceived funniness of punning jokes. [PDF]
Palmann A, Miller T.
europepmc +1 more source
Voice-based user interface for hands-free data entry and automation at workplaces. [PDF]
Harihar D +3 more
europepmc +1 more source
Representation of Molecules by Sequences of Instructions. [PDF]
Thurnhofer-Hemsi K +3 more
europepmc +1 more source
Measuring Chemical LLM robustness to molecular representations: a SMILES variation-based framework. [PDF]
Ganeeva V +3 more
europepmc +1 more source
Sex differences in the lateralization of sustained electrophysiological response to 40 Hz clicks in typically developing preschoolers. [PDF]
Manasevich V, Neklyudova A, Sysoeva O.
europepmc +1 more source
Operationalizing language-based population stratification for widening access to precision genomics in Africa. [PDF]
Kulohoma BW, Wesonga CSA.
europepmc +1 more source
An enhanced approach for automatic annotation of error codes based on Seq2edit. [PDF]
Wang J, Lin T, Zhao R, Zhao H.
europepmc +1 more source
The use of Levenshtein distance in computer forensics
ENGELSK: Computer technology is gaining widespread use, and is becoming an increasingly important factor in our everyday lives. This technology opens up new possibilities, but may also be used as a tool of crime. To counter this, computer forensics professionals analyse data in memory and hard drives for clues and evidence of such criminal activities ...
openaire +1 more source

