Sciweavers

3638 search results - page 128 / 728
» Distribution chain security
Sort
View
90
Voted
ALGORITHMICA
2007
70views more  ALGORITHMICA 2007»
15 years 2 months ago
Sampling Conformation Space to Model Equilibrium Fluctuations in Proteins
This paper proposes the Protein Ensemble Method (PEM) to model equilibrium fluctuations in proteins where fragments of the protein polypeptide chain can move independently of one ...
Amarda Shehu, Cecilia Clementi, Lydia E. Kavraki
100
Voted
ACL
2010
15 years 20 days ago
WebLicht: Web-Based LRT Services for German
This software demonstration presents WebLicht (short for: Web-Based Linguistic Chaining Tool), a webbased service environment for the integration and use of language resources and...
Erhard W. Hinrichs, Marie Hinrichs, Thomas Zastrow
205
Voted
IVC
2008
141views more  IVC 2008»
15 years 2 months ago
Segmentation of color images via reversible jump MCMC sampling
Reversible jump Markov chain Monte Carlo (RJMCMC) is a recent method which makes it possible to construct reversible Markov chain samplers that jump between parameter subspaces of...
Zoltan Kato
114
Voted
WWW
2008
ACM
16 years 3 months ago
Secure or insure?: a game-theoretic analysis of information security games
Despite general awareness of the importance of keeping one's system secure, and widespread availability of consumer security technologies, actual investment in security remai...
Jens Grossklags, Nicolas Christin, John Chuang
148
Voted
TIT
2010
107views Education» more  TIT 2010»
14 years 9 months ago
Information inequalities for joint distributions, with interpretations and applications
Upper and lower bounds are obtained for the joint entropy of a collection of random variables in terms of an arbitrary collection of subset joint entropies. These inequalities gene...
Mokshay M. Madiman, Prasad Tetali