Sciweavers

303 search results - page 8 / 61
» Context-Sensitive Call Control Using Constraints and Rules
Sort
View
BMCBI
2008
98views more  BMCBI 2008»
13 years 7 months ago
GBNet: Deciphering regulatory rules in the co-regulated genes using a Gibbs sampler enhanced Bayesian network approach
Background: Combinatorial regulation of transcription factors (TFs) is important in determining the complex gene expression patterns particularly in higher organisms. Deciphering ...
Li Shen, Jie Liu, Wei Wang
ACL
1998
13 years 9 months ago
Parsing Ambiguous Structures using Controlled Disjunctions and Unary Quasi-Trees
The problem of parsing ambiguous structures concerns (i) their representation and (ii) the specification of mechanisms allowing to delay and control their evaluation. We first pro...
Philippe Blache
CSFW
2006
IEEE
14 years 1 months ago
Privacy APIs: Access Control Techniques to Analyze and Verify Legal Privacy Policies
There is a growing interest in establishing rules to regulate the privacy of citizens in the treatment of sensitive personal data such as medical and financial records. Such rule...
Michael J. May, Carl A. Gunter, Insup Lee
AAAI
2006
13 years 9 months ago
A New Approach to Distributed Task Assignment using Lagrangian Decomposition and Distributed Constraint Satisfaction
We present a new formulation of distributed task assignment, called Generalized Mutual Assignment Problem (GMAP), which is derived from an NP-hard combinatorial optimization probl...
Katsutoshi Hirayama
AIPS
2010
13 years 7 months ago
Iterative Learning of Weighted Rule Sets for Greedy Search
Greedy search is commonly used in an attempt to generate solutions quickly at the expense of completeness and optimality. In this work, we consider learning sets of weighted actio...
Yuehua Xu, Alan Fern, Sung Wook Yoon