Sciweavers

835 search results - page 136 / 167
» Characterizing rosy theories
Sort
View
NMR
2004
Springer
14 years 3 months ago
Preferential defeasibility: utility in defeasible logic programming
The development of Logic Programming and Defeasible Argumentation lead to Defeasible Logic Programming. Its core resides in the characterization of the warrant procedure. Defeasib...
Fernando A. Tohmé, Guillermo Ricardo Simari
ICALP
2010
Springer
14 years 2 months ago
Testing Non-uniform k-Wise Independent Distributions over Product Spaces
A discrete distribution D over Σ1 × · · · × Σn is called (non-uniform) k-wise independent if for any set of k indexes {i1, . . . , ik} and for any z1 ∈ Σi1 , . . . , zk ...
Ronitt Rubinfeld, Ning Xie
CORR
2008
Springer
98views Education» more  CORR 2008»
13 years 10 months ago
An Information-Theoretical View of Network-Aware Malware Attacks
This work investigates three aspects: (a) a network vulnerability as the non-uniform vulnerable-host distribution, (b) threats, i.e., intelligent malwares that exploit such a vulne...
Zesheng Chen, Chuanyi Ji
BMCBI
2006
172views more  BMCBI 2006»
13 years 10 months ago
A novel scoring schema for peptide identification by searching protein sequence databases using tandem mass spectrometry data
Background: Tandem mass spectrometry (MS/MS) is a powerful tool for protein identification. Although great efforts have been made in scoring the correlation between tandem mass sp...
Zhuo Zhang, Shiwei Sun, Xiaopeng Zhu, Suhua Chang,...
BMCBI
2006
142views more  BMCBI 2006»
13 years 10 months ago
Correlated fragile site expression allows the identification of candidate fragile genes involved in immunity and associated with
Background: Common fragile sites (cfs) are specific regions in the human genome that are particularly prone to genomic instability under conditions of replicative stress. Several ...
Angela Re, Davide Corà, Alda Maria Puliti, ...