Sciweavers

702 search results - page 126 / 141
» Identifying Graph Automorphisms Using Determining Sets
Sort
View
FC
1998
Springer
96views Cryptology» more  FC 1998»
14 years 21 days ago
Compliance Checking in the PolicyMaker Trust Management System
Emerging electronic commerce services that use public-key cryptography on a mass-market scale require sophisticated mechanisms for managing trust. For example, any service that rec...
Matt Blaze, Joan Feigenbaum, Martin Strauss
BMCBI
2006
115views more  BMCBI 2006»
13 years 8 months ago
AgdbNet - antigen sequence database software for bacterial typing
Background: Bacterial typing schemes based on the sequences of genes encoding surface antigens require databases that provide a uniform, curated, and widely accepted nomenclature ...
Keith A. Jolley, Martin C. J. Maiden
BMCBI
2011
13 years 3 months ago
A discriminative method for family-based protein remote homology detection that combines inductive logic programming and proposi
Background: Remote homology detection is a hard computational problem. Most approaches have trained computational models by using either full protein sequences or multiple sequenc...
Juliana S. Bernardes, Alessandra Carbone, Gerson Z...
WWW
2009
ACM
14 years 9 months ago
Enhancing diversity, coverage and balance for summarization through structure learning
Document summarization plays an increasingly important role with the exponential growth of documents on the Web. Many supervised and unsupervised approaches have been proposed to ...
Liangda Li, Ke Zhou, Gui-Rong Xue, Hongyuan Zha, Y...
RECOMB
2003
Springer
14 years 8 months ago
Phylogenetically and spatially conserved word pairs associated with gene expression changes in yeasts
Background: Transcriptional regulation in eukaryotes often involves multiple transcription factors binding to the same transcription control region, and to understand the regulato...
Derek Y. Chiang, Alan M. Moses, Manolis Kamvysseli...