Sciweavers

342 search results - page 63 / 69
» Evaluation of Classifiers for an Uneven Class Distribution P...
Sort
View
UAI
2003
13 years 8 months ago
Learning Module Networks
Methods for learning Bayesian networks can discover dependency structure between observed variables. Although these methods are useful in many applications, they run into computat...
Eran Segal, Dana Pe'er, Aviv Regev, Daphne Koller,...
CRYPTO
2010
Springer
201views Cryptology» more  CRYPTO 2010»
13 years 7 months ago
Protecting Cryptographic Keys against Continual Leakage
Side-channel attacks have often proven to have a devastating effect on the security of cryptographic schemes. In this paper, we address the problem of storing cryptographic keys a...
Ali Juma, Yevgeniy Vahlis
SEMWEB
2010
Springer
13 years 4 months ago
Optimize First, Buy Later: Analyzing Metrics to Ramp-Up Very Large Knowledge Bases
As knowledge bases move into the landscape of larger ontologies and have terabytes of related data, we must work on optimizing the performance of our tools. We are easily tempted t...
Paea LePendu, Natalya Fridman Noy, Clement Jonquet...
JSAC
2011
191views more  JSAC 2011»
13 years 1 months ago
CRP: A Routing Protocol for Cognitive Radio Ad Hoc Networks
Abstract—Cognitive radio (CR) technology enables the opportunistic use of the vacant licensed frequency bands, thereby improving the spectrum utilization. However, the CR operati...
Kaushik R. Chowdhury, Ian F. Akyildiz
BMCBI
2008
200views more  BMCBI 2008»
13 years 6 months ago
Defining functional distances over Gene Ontology
Background: A fundamental problem when trying to define the functional relationships between proteins is the difficulty in quantifying functional similarities, even when well-stru...
Angela del Pozo, Florencio Pazos, Alfonso Valencia