Sciweavers

5384 search results - page 1066 / 1077
» Open Standards Requirements
Sort
View
CIKM
2010
Springer
13 years 6 months ago
Building efficient multi-threaded search nodes
Search nodes are single-purpose components of large Web search engines and their efficient implementation is critical to sustain thousands of queries per second and guarantee indi...
Carolina Bonacic, Carlos García, Mauricio M...
DMIN
2010
262views Data Mining» more  DMIN 2010»
13 years 6 months ago
SMO-Style Algorithms for Learning Using Privileged Information
Recently Vapnik et al. [11, 12, 13] introduced a new learning model, called Learning Using Privileged Information (LUPI). In this model, along with standard training data, the tea...
Dmitry Pechyony, Rauf Izmailov, Akshay Vashist, Vl...
BMCBI
2010
126views more  BMCBI 2010»
13 years 5 months ago
Systematic integration of experimental data and models in systems biology
Background: The behaviour of biological systems can be deduced from their mathematical models. However, multiple sources of data in diverse forms are required in the construction ...
Peter Li, Joseph O. Dada, Daniel Jameson, Irena Sp...
BMCBI
2010
155views more  BMCBI 2010»
13 years 5 months ago
BrEPS: a flexible and automatic protocol to compute enzyme-specific sequence profiles for functional annotation
Background: Models for the simulation of metabolic networks require the accurate prediction of enzyme function. Based on a genomic sequence, enzymatic functions of gene products a...
Constantin Bannert, A. Welfle, C. aus dem Spring, ...
CORR
2010
Springer
155views Education» more  CORR 2010»
13 years 5 months ago
A Proof Theoretic Analysis of Intruder Theories
We consider the problem of intruder deduction in security protocol analysis: that is, deciding whether a given message M can be deduced from a set of messages under the theory of ...
Alwen Tiu, Rajeev Goré, Jeremy E. Dawson
« Prev « First page 1066 / 1077 Last » Next »