Sciweavers

174 search results - page 32 / 35
» Learning to Reason with a Restricted View
Sort
View
AFRICACRYPT
2009
Springer
13 years 11 months ago
Certified Encryption Revisited
The notion of certified encryption had recently been suggested as a suitable setting for analyzing the security of encryption against adversaries that tamper with the key-registrat...
Pooya Farshim, Bogdan Warinschi
BMCBI
2006
74views more  BMCBI 2006»
13 years 7 months ago
Protein protein interactions, evolutionary rate, abundance and age
Background: Does a relationship exist between a protein's evolutionary rate and its number of interactions? This relationship has been put forward many times, based on a biol...
Ramazan Saeed, Charlotte M. Deane
AIR
2004
113views more  AIR 2004»
13 years 7 months ago
Class Noise vs. Attribute Noise: A Quantitative Study
Real-world data is never perfect and can often suffer from corruptions (noise) that may impact interpretations of the data, models created from the data and decisions made based on...
Xingquan Zhu, Xindong Wu
CAISE
2009
Springer
14 years 2 months ago
TomTom for Business Process Management (TomTom4BPM)
Navigation systems have proven to be quite useful for many drivers. People increasingly rely on the devices of TomTom and other vendors and find it useful to get directions to go ...
Wil M. P. van der Aalst
COLT
2005
Springer
14 years 28 days ago
General Polynomial Time Decomposition Algorithms
We present a general decomposition algorithm that is uniformly applicable to every (suitably normalized) instance of Convex Quadratic Optimization and efficiently approaches an o...
Nikolas List, Hans-Ulrich Simon