Sciweavers

4419 search results - page 818 / 884
» Information Science in Transition
Sort
View
CORR
2010
Springer
184views Education» more  CORR 2010»
13 years 8 months ago
Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay
We consider a Gaussian two-hop network where the source and the destination can communicate only via a relay node who is both an eavesdropper and a Byzantine adversary. Both the s...
Xiang He, Aylin Yener
CIKM
2010
Springer
13 years 7 months ago
Mining interesting link formation rules in social networks
Link structures are important patterns one looks out for when modeling and analyzing social networks. In this paper, we propose the task of mining interesting Link Formation rules...
Cane Wing-ki Leung, Ee-Peng Lim, David Lo, Jianshu...
SAICSIT
2010
ACM
13 years 6 months ago
Determining requirements within an indigenous knowledge system of African rural communities
Eliciting and analyzing requirements within knowledge systems, which fundamentally differ so far from technology supported systems represent particular challenges. African rural c...
Heike Winschiers-Theophilus, Nicola J. Bidwell, Sh...
BCB
2010
140views Bioinformatics» more  BCB 2010»
13 years 4 months ago
Guiding belief propagation using domain knowledge for protein-structure determination
A major bottleneck in high-throughput protein crystallography is producing protein-structure models from an electrondensity map. In previous work, we developed Acmi, a probabilist...
Ameet Soni, Craig A. Bingman, Jude W. Shavlik
IDA
2011
Springer
13 years 3 months ago
Ubiquitous Knowledge Discovery
Ubiquitous Knowledge Discovery is a new research area at the intersection of machine learning and data mining with mobile and distributed systems. In this paper the main character...
João Gama, Michael May