Sciweavers

813 search results - page 88 / 163
» Pipeline-centric provenance model
Sort
View
GFKL
2007
Springer
139views Data Mining» more  GFKL 2007»
14 years 3 months ago
The Noise Component in Model-based Cluster Analysis
The so-called noise-component has been introduced by Banfield and Raftery (1993) to improve the robustness of cluster analysis based on the normal mixture model. The idea is to ad...
Christian Hennig, Pietro Coretto
ISW
2007
Springer
14 years 3 months ago
Strongly-Secure Identity-Based Key Agreement and Anonymous Extension
Abstract. We study the provable security of identity-based (ID-based) key agreement protocols. Although several published protocols have been proven secure in the random oracle mod...
Sherman S. M. Chow, Kim-Kwang Raymond Choo
KES
2007
Springer
14 years 3 months ago
Predictive and Contextual Feature Separation for Bayesian Metanetworks
Bayesian Networks are proven to be a comprehensive model to describe causal relationships among domain attributes with probabilistic measure of conditional dependency. However, dep...
Vagan Y. Terziyan
IPPS
2006
IEEE
14 years 3 months ago
Tree-based overlay networks for scalable applications
The increasing availability of high-performance computing systems with thousands, tens of thousands, and even hundreds of thousands of computational nodes is driving the demand fo...
Dorian C. Arnold, G. D. Pack, Barton P. Miller
CSB
2002
IEEE
109views Bioinformatics» more  CSB 2002»
14 years 2 months ago
Towards Automatic Clustering of Protein Sequences
Analyzing protein sequence data becomes increasingly important recently. Most previous work on this area has mainly focused on building classification models. In this paper, we i...
Jiong Yang, Wei Wang 0010