Sciweavers

18451 search results - page 3474 / 3691
» Selecting the
Sort
View
167
Voted
ICISC
2000
126views Cryptology» more  ICISC 2000»
15 years 5 months ago
Cryptographic Applications of Sparse Polynomials over Finite Rings
Abstract. This paper gives new examples that exploit the idea of using sparse polynomials with restricted coefficients over a finite ring for designing fast, reliable cryptosystems...
William D. Banks, Daniel Lieman, Igor Shparlinski,...
128
Voted
ACL
1997
15 years 5 months ago
Co-evolution of Language and of the Language Acquisition Device
A new account of parameter setting during grammatical acquisition is presented in terms of Generalized Categorial Grammar embedded in a default inheritance hierarchy, providing a ...
Ted Briscoe
ISMB
2000
15 years 5 months ago
Analysis of Gene Expression Microarrays for Phenotype Classification
Several microarray technologies that monitor the level of expression of a large number of genes have recently emerged. Given DNA-microarray data for a set of cells characterized b...
Andrea Califano, Gustavo Stolovitzky, Yuhai Tu
102
Voted
ISMB
2000
15 years 5 months ago
An Evaluation of Ontology Exchange Languages for Bioinformatics
Ontologies are specifications of the concepts in a given field, and of the relationships among those concepts. The development of ontologies for molecular-biology information and ...
Robin McEntire, Peter D. Karp, Neil F. Abernethy, ...
128
Voted
PAKM
1998
15 years 5 months ago
Knowledge Management: A Text Mining Approach
Knowledge Discovery in Databases (KDD), also known as data mining, focuses on the computerized exploration of large amounts of data and on the discovery of interesting patterns wi...
Ronen Feldman, Moshe Fresko, Haym Hirsh, Yonatan A...
« Prev « First page 3474 / 3691 Last » Next »