Sciweavers

2079 search results - page 248 / 416
» Quantifying Information Flow
Sort
View
JIB
2006
78views more  JIB 2006»
13 years 10 months ago
Prediction of transcription factor binding to DNA using rule induction methods
In this study, we seek to develop a predictive model for finding the strength of binding between a particular transcription factor (TF) variant and a particular DNA target variant...
Mikael Huss, Karin Nordström
APAL
2002
101views more  APAL 2002»
13 years 10 months ago
The logic of tasks
The paper introduces a semantics for the language of classical first order logic supplemented with the additional operators and . This semantics understands formulas as tasks. An ...
Giorgi Japaridze
WWW
2004
ACM
14 years 11 months ago
Integrating elliptic curve cryptography into the web's security infrastructure
RSA is the most popular public-key cryptosystem on the Web today but long-term trends such as the proliferation of smaller, simpler devices and increasing security needs will make...
Vipul Gupta, Douglas Stebila, Sheueling Chang Shan...
KDD
2008
ACM
202views Data Mining» more  KDD 2008»
14 years 10 months ago
Data and Structural k-Anonymity in Social Networks
The advent of social network sites in the last years seems to be a trend that will likely continue. What naive technology users may not realize is that the information they provide...
Alina Campan, Traian Marius Truta
WSDM
2010
ACM
215views Data Mining» more  WSDM 2010»
14 years 7 months ago
Boilerplate Detection using Shallow Text Features
In addition to the actual content Web pages consist of navigational elements, templates, and advertisements. This boilerplate text typically is not related to the main content, ma...
Christian Kohlschütter, Peter Fankhauser, Wol...