Sciweavers

977 search results - page 195 / 196
» Constructing informative priors using transfer learning
Sort
View
FOCS
2007
IEEE
14 years 1 months ago
Intrusion-Resilient Secret Sharing
We introduce a new primitive called Intrusion-Resilient Secret Sharing (IRSS), whose security proof exploits the fact that there exist functions which can be efficiently computed ...
Stefan Dziembowski, Krzysztof Pietrzak
GI
2004
Springer
14 years 28 days ago
Quality Criteria for Competency Assignments: Examples from a Project Management Case Study
: We present several quality criteria for skills management initiatives based on the competence-performance approach [Kor97]. The criteria help to measure reliability and validity ...
Tobias Ley, Dietrich Albert
ATAL
2008
Springer
13 years 9 months ago
Content-oriented composite service negotiation with complex preferences
In e-commerce, for some cases the service requested by the consumer cannot be fulfilled by the producer. In such cases, service consumers and producers need to negotiate their ser...
Reyhan Aydogan
BMCBI
2007
145views more  BMCBI 2007»
13 years 7 months ago
Improved benchmarks for computational motif discovery
Background: An important step in annotation of sequenced genomes is the identification of transcription factor binding sites. More than a hundred different computational methods h...
Geir Kjetil Sandve, Osman Abul, Vegard Walseng, Fi...
WWW
2006
ACM
14 years 8 months ago
Invisible participants: how cultural capital relates to lurking behavior
The asymmetry of activity in virtual communities is of great interest. While participation in the activities of virtual communities is crucial for a community's survival and ...
Vladimir Soroka, Sheizaf Rafaeli