Sciweavers

1356 search results - page 163 / 272
» Some New Results on Inverse Sorting Problems
Sort
View
ICDCSW
2007
IEEE
14 years 3 months ago
UBCA: Utility-Based Clustering Architecture for Peer-to-Peer Systems
Peer-to-Peer (P2P) systems are currently used in a variety of applications. File sharing applications and ad hoc networking have fueled the usage of these systems. P2P systems gen...
Brent Lagesse, Mohan Kumar
WABI
2005
Springer
118views Bioinformatics» more  WABI 2005»
14 years 2 months ago
A Hidden Markov Technique for Haplotype Reconstruction
We give a new algorithm for the genotype phasing problem. Our solution is based on a hidden Markov model for haplotypes. The model has a uniform structure, unlike most solutions pr...
Pasi Rastas, Mikko Koivisto, Heikki Mannila, Esko ...
ICSM
1995
IEEE
14 years 15 days ago
Iterative reengineering to compensate for quick-fix maintenance
A typical approach to software maintenance is analyzing just the source code, applying some patches, releasing the new version, and then updating the documentation. This quick-fix...
Filippo Lanubile, Giuseppe Visaggio
IWCMC
2010
ACM
13 years 11 months ago
On the use of random neural networks for traffic matrix estimation in large-scale IP networks
Despite a large body of literature and methods devoted to the Traffic Matrix (TM) estimation problem, the inference of traffic flows volume from aggregated data still represents a ...
Pedro Casas, Sandrine Vaton
EMNLP
2011
12 years 8 months ago
Watermarking the Outputs of Structured Prediction with an application in Statistical Machine Translation
We propose a general method to watermark and probabilistically identify the structured outputs of machine learning algorithms. Our method is robust to local editing operations and...
Ashish Venugopal, Jakob Uszkoreit, David Talbot, F...