Sciweavers

3556 search results - page 544 / 712
» Can machine learning be secure
Sort
View
ISMB
1998
14 years 4 days ago
Identification of Divergent Functions in Homologous Proteins by Induction over Conserved Modules
Homologousproteins do not necessarily exhibit identical biochemicalfunction. Despitethis fact, local or global sequence similarity is widely used as an indication of functional id...
Imran Shah, Lawrence Hunter
SODA
1998
ACM
113views Algorithms» more  SODA 1998»
14 years 4 days ago
Fast Hierarchical Clustering and Other Applications of Dynamic Closest Pairs
We develop data structures for dynamic closest pair problems with arbitrary (not necessarily geometric) distance functions, based on a technique previously used by the author for ...
David Eppstein
CAEPIA
2009
Springer
13 years 12 months ago
Empirical Hardness for Mixed Auctions
Mixed Multi-Unit Combinatorial Auctions (MMUCAs) offer a high potential to be employed for the automated assembly of supply chains of agents. However, little is known about the fac...
Pablo Almajano, Jesús Cerquides, Juan A. Ro...
EMNLP
2008
13 years 12 months ago
Incorporating Temporal and Semantic Information with Eye Gaze for Automatic Word Acquisition in Multimodal Conversational System
One major bottleneck in conversational systems is their incapability in interpreting unexpected user language inputs such as out-ofvocabulary words. To overcome this problem, conv...
Shaolin Qu, Joyce Yue Chai
GRC
2008
IEEE
13 years 11 months ago
A Computational Model on Harmonizing Chinese Folksong with Piano Accompaniment
Research on auto-harmonizing a melody (e.g. Chinese folksong) with piano accompaniment is trying to build up a computer system which generates a 3voice music including piano left-...
Yin Feng, Chang-Le Zhou