Sciweavers

18306 search results - page 3488 / 3662
» Algorithmics in Exponential Time
Sort
View
RECOMB
2009
Springer
14 years 10 months ago
Learning Models for Aligning Protein Sequences with Predicted Secondary Structure
Accurately aligning distant protein sequences is notoriously difficult. A recent approach to improving alignment accuracy is to use additional information such as predicted seconda...
Eagu Kim, Travis J. Wheeler, John D. Kececioglu
CHI
2009
ACM
14 years 10 months ago
Dancing with myself: the interactive visual canon platform
The canon is a composition pattern with a long history and many forms. The concept of the canon has also been applied to experimental film making and on Japanese television. We de...
Christoph Bartneck, Martijn ten Bhömer, Mathi...
TCC
2009
Springer
167views Cryptology» more  TCC 2009»
14 years 10 months ago
Simultaneous Hardcore Bits and Cryptography against Memory Attacks
This paper considers two questions in cryptography. Cryptography Secure Against Memory Attacks. A particularly devastating side-channel attack against cryptosystems, termed the &qu...
Adi Akavia, Shafi Goldwasser, Vinod Vaikuntanathan
KDD
2009
ACM
191views Data Mining» more  KDD 2009»
14 years 10 months ago
Efficient methods for topic model inference on streaming document collections
Topic models provide a powerful tool for analyzing large text collections by representing high dimensional data in a low dimensional subspace. Fitting a topic model given a set of...
Limin Yao, David M. Mimno, Andrew McCallum
KDD
2009
ACM
187views Data Mining» more  KDD 2009»
14 years 10 months ago
New ensemble methods for evolving data streams
Advanced analysis of data streams is quickly becoming a key area of data mining research as the number of applications demanding such processing increases. Online mining when such...
Albert Bifet, Bernhard Pfahringer, Geoffrey Holmes...
« Prev « First page 3488 / 3662 Last » Next »