Sciweavers

1358 search results - page 255 / 272
» Proceedings
Sort
View
BMCBI
2005
136views more  BMCBI 2005»
13 years 9 months ago
Automatic detection of false annotations via binary property clustering
Background: Computational protein annotation methods occasionally introduce errors. Falsepositive (FP) errors are annotations that are mistakenly associated with a protein. Such f...
Noam Kaplan, Michal Linial
TOIS
2008
145views more  TOIS 2008»
13 years 9 months ago
Classification-aware hidden-web text database selection
Many valuable text databases on the web have non-crawlable contents that are "hidden" behind search interfaces. Metasearchers are helpful tools for searching over multip...
Panagiotis G. Ipeirotis, Luis Gravano
JOC
2007
84views more  JOC 2007»
13 years 9 months ago
Concurrent Composition of Secure Protocols in the Timing Model
In the setting of secure multiparty computation, a set of mutually distrustful parties wish to securely compute some joint function of their inputs. In the stand-alone case, it ha...
Yael Tauman Kalai, Yehuda Lindell, Manoj Prabhakar...
JSS
2007
115views more  JSS 2007»
13 years 9 months ago
A case study in re-engineering to enforce architectural control flow and data sharing
Without rigorous software development and maintenance, software tends to lose its original architectural structure and become difficult to understand and modify. ArchJava, a recen...
Marwan Abi-Antoun, Jonathan Aldrich, Wesley Coelho
BC
2004
113views more  BC 2004»
13 years 9 months ago
Mechanical model of the recovery from stumbling
Abstract. Several strategies have been described as a reaction to a stumble during gait. The elevating strategy, which tries to proceed with the perturbed step, was executed as a r...
A. Forner-Cordero, H. F. J. M. Koopman, Frans C. T...