Sciweavers

629 search results - page 109 / 126
» Providing Justifications in Recommender Systems
Sort
View
BMCBI
2008
149views more  BMCBI 2008»
13 years 10 months ago
All-paths graph kernel for protein-protein interaction extraction with evaluation of cross-corpus learning
Background: Automated extraction of protein-protein interactions (PPI) is an important and widely studied task in biomedical text mining. We propose a graph kernel based approach ...
Antti Airola, Sampo Pyysalo, Jari Björne, Tap...
LATINCRYPT
2010
13 years 8 months ago
Cryptanalysis of the Hidden Matrix Cryptosystem
Abstract. In this paper, we present an efficient cryptanalysis of the socalled HM cryptosystem which was published at Asiacrypt’1999, and one perturbed version of HM. Until now, ...
Jean-Charles Faugère, Antoine Joux, Ludovic...
TCOS
2010
13 years 4 months ago
Green Secure Processors: Towards Power-Efficient Secure Processor Design
With the increasing wealth of digital information stored on computer systems today, security issues have become increasingly important. In addition to attacks targeting the softwar...
Siddhartha Chhabra, Yan Solihin
WSC
1997
13 years 11 months ago
MedModel - Healthcare Simulation Software
In response to the expressed needs of MedModel users, PROMODEL Corporation has made substantial improvements in its MedModel healthcare simulation software. Beginning with its inc...
Steve H. Denney
KDD
2010
ACM
259views Data Mining» more  KDD 2010»
14 years 1 months ago
A probabilistic model for personalized tag prediction
Social tagging systems have become increasingly popular for sharing and organizing web resources. Tag recommendation is a common feature of social tagging systems. Social tagging ...
Dawei Yin, Zhenzhen Xue, Liangjie Hong, Brian D. D...