Sciweavers

897 search results - page 23 / 180
» Identity: How to name it, How to find it
Sort
View
ETFA
2005
IEEE
14 years 2 months ago
A security architecture for data privacy and security
Data access and software exchange are often achieved over insecure networks such as the public Internet. System designers are therefore forced to be proactive with regard to verif...
Alfred C. Weaver
DIS
2007
Springer
14 years 2 months ago
A Consequence Finding Approach for Full Clausal Abduction
Abductive inference has long been associated with the logic of scientific discovery and automated abduction is now being used in real scientific tasks. But few methods can exploi...
Oliver Ray, Katsumi Inoue
VLDB
1997
ACM
117views Database» more  VLDB 1997»
14 years 23 days ago
Finding Data in the Neighborhood
In this paper, we present and evaluate alternative techniques to effect the use of location-independent identifiers in distributed database systems. Location-independent identi...
André Eickler, Alfons Kemper, Donald Kossma...
BMCBI
2008
130views more  BMCBI 2008»
13 years 8 months ago
An enhanced partial order curve comparison algorithm and its application to analyzing protein folding trajectories
Background: Understanding how proteins fold is essential to our quest in discovering how life works at the molecular level. Current computation power enables researchers to produc...
Hong Sun, Hakan Ferhatosmanoglu, Motonori Ota, Yus...
AIEDU
2005
185views more  AIEDU 2005»
13 years 8 months ago
A Bayesian Student Model without Hidden Nodes and its Comparison with Item Response Theory
The Bayesian framework offers a number of techniques for inferring an individual's knowledge state from evidence of mastery of concepts or skills. A typical application where ...
Michel C. Desmarais, Xiaoming Pu