Sciweavers

633 search results - page 99 / 127
» A Few Constructions on Constructors
Sort
View
BMCBI
2008
86views more  BMCBI 2008»
13 years 10 months ago
Subfamily specific conservation profiles for proteins based on n-gram patterns
Background: A new algorithm has been developed for generating conservation profiles that reflect the evolutionary history of the subfamily associated with a query sequence. It is ...
John K. Vries, Xiong Liu
BMCBI
2008
83views more  BMCBI 2008»
13 years 10 months ago
Terminologies for text-mining; an experiment in the lipoprotein metabolism domain
Background: The engineering of ontologies, especially with a view to a text-mining use, is still a new research field. There does not yet exist a well-defined theory and technolog...
Dimitra Alexopoulou, Thomas Wächter, Laura Pi...
CG
2007
Springer
13 years 9 months ago
Visual data mining and analysis of software repositories
In this article we describe an ongoing effort to integrate information visualization techniques into the process of configuration management for software systems. Our focus is to...
Lucian Voinea, Alexandru Telea
ML
2000
ACM
154views Machine Learning» more  ML 2000»
13 years 9 months ago
Lazy Learning of Bayesian Rules
The naive Bayesian classifier provides a simple and effective approach to classifier learning, but its attribute independence assumption is often violated in the real world. A numb...
Zijian Zheng, Geoffrey I. Webb
SSS
2010
Springer
154views Control Systems» more  SSS 2010»
13 years 8 months ago
Authenticated Broadcast with a Partially Compromised Public-Key Infrastructure
Abstract. Given a public-key infrastructure (PKI) and digital signatures, it is possible to construct broadcast protocols tolerating any number of corrupted parties. Almost all exi...
S. Dov Gordon, Jonathan Katz, Ranjit Kumaresan, Ar...