Sciweavers

1047 search results - page 206 / 210
» Learning the required number of agents for complex tasks
Sort
View
CCS
2003
ACM
14 years 26 days ago
Cryptographic tamper evidence
We propose a new notion of cryptographic tamper evidence. A tamper-evident signature scheme provides an additional procedure Div which detects tampering: given two signatures, Div...
Gene Itkis
BMCBI
2007
166views more  BMCBI 2007»
13 years 7 months ago
Optimization of filtering criterion for SEQUEST database searching to improve proteome coverage in shotgun proteomics
Background: In proteomic analysis, MS/MS spectra acquired by mass spectrometer are assigned to peptides by database searching algorithms such as SEQUEST. The assignations of pepti...
Xinning Jiang, Xiaogang Jiang, Guanghui Han, Mingl...
TSE
2002
157views more  TSE 2002»
13 years 7 months ago
Assessing the Applicability of Fault-Proneness Models Across Object-Oriented Software Projects
A number of papers have investigated the relationships between design metrics and the detection of faults in object-oriented software. Several of these studies have shown that suc...
Lionel C. Briand, Walcélio L. Melo, Jü...
BMCBI
2010
172views more  BMCBI 2010»
13 years 2 months ago
Nonparametric identification of regulatory interactions from spatial and temporal gene expression data
Background: The correlation between the expression levels of transcription factors and their target genes can be used to infer interactions within animal regulatory networks, but ...
Anil Aswani, Soile V. E. Keränen, James Brown...
EDBT
2008
ACM
169views Database» more  EDBT 2008»
14 years 7 months ago
BioScout: a life-science query monitoring system
Scientific data are available through an increasing number of heterogeneous, independently evolving, sources. Although the sources themselves are independently evolving, the data ...
Anastasios Kementsietsidis, Frank Neven, Dieter Va...