Sciweavers

4451 search results - page 840 / 891
» On Random Ordering Constraints
Sort
View
BMCBI
2011
13 years 3 months ago
Meta-analysis of gene expression microarrays with missing replicates
Background: Many different microarray experiments are publicly available today. It is natural to ask whether different experiments for the same phenotypic conditions can be combin...
Fan Shi, Gad Abraham, Christopher Leckie, Izhak Ha...
CN
2011
116views more  CN 2011»
13 years 3 months ago
WDA: A Web farm Distributed Denial Of Service attack attenuator
Distributed Denial Of Service (DDoS) attacks are familiar threats to Internet users for more than ten years. Such attacks are carried out by a “Bot net”, an army of zombie hos...
Ehud Doron, Avishai Wool
COGCOM
2011
228views more  COGCOM 2011»
13 years 3 months ago
Clustering of Gaze During Dynamic Scene Viewing is Predicted by Motion
Where does one attend when viewing dynamic scenes? Research into the factors influencing gaze location during static scene viewing have reported that low-level visual features con...
Parag K. Mital, Tim J. Smith, Robin L. Hill, John ...
JMLR
2011
111views more  JMLR 2011»
13 years 2 months ago
Models of Cooperative Teaching and Learning
While most supervised machine learning models assume that training examples are sampled at random or adversarially, this article is concerned with models of learning from a cooper...
Sandra Zilles, Steffen Lange, Robert Holte, Martin...
SIAMCOMP
2011
13 years 2 months ago
Black-Box Constructions of Protocols for Secure Computation
In this paper, we study the question of whether or not it is possible to construct protocols for general secure computation in the setting of malicious adversaries and no honest m...
Iftach Haitner, Yuval Ishai, Eyal Kushilevitz, Yeh...