Sciweavers

2386 search results - page 476 / 478
» Database Security 2000
Sort
View
CORR
2000
Springer
120views Education» more  CORR 2000»
13 years 8 months ago
Scaling Up Inductive Logic Programming by Learning from Interpretations
When comparing inductive logic programming (ILP) and attribute-value learning techniques, there is a trade-off between expressive power and efficiency. Inductive logic programming ...
Hendrik Blockeel, Luc De Raedt, Nico Jacobs, Bart ...
JACM
2000
81views more  JACM 2000»
13 years 8 months ago
Relational queries over interpreted structures
We rework parts of the classical relational theory when the underlying domain is a structure with some interpreted operations that can be used in queries. We identify parts of the...
Michael Benedikt, Leonid Libkin
JCB
2000
146views more  JCB 2000»
13 years 8 months ago
Bayesian Segmentation of Protein Secondary Structure
We present a novel method for predicting the secondary structure of a protein from its amino acid sequence. Most existing methods predict each position in turn based on a local wi...
Scott C. Schmidler, Jun S. Liu, Douglas L. Brutlag
JODL
2000
123views more  JODL 2000»
13 years 8 months ago
On Z39.50 wrapping and description logics
Z39.50 is a client/server protocol widely used in digital libraries and museums for searching and retrieving information spread over a number of heterogeneous sources. To overcome ...
Yannis Velegrakis, Vassilis Christophides, Panos C...
JSS
2000
123views more  JSS 2000»
13 years 8 months ago
Approaches for broadcasting temporal data in mobile computing systems
Rapid advances in mobile communication technology have spawned many new mobile applications. A key element in many of these systems is the need to distribute real-time information...
Kam-yiu Lam, Edward Chan, Joe Chun-Hung Yuen