Sciweavers

1099 search results - page 117 / 220
» String Transformation Learning
Sort
View
EUROCRYPT
2000
Springer
14 years 2 months ago
Minimal-Latency Secure Function Evaluation
Sander, Young and Yung recently exhibited a protocol for computing on encrypted inputs, for functions computable in NC1 . In their variant of secure function evaluation, Bob (the &...
Donald Beaver
DEXA
2008
Springer
123views Database» more  DEXA 2008»
14 years 4 days ago
Evolutionary Clustering in Description Logics: Controlling Concept Formation and Drift in Ontologies
Abstract. We present a method based on clustering techniques to detect concept drift or novelty in a knowledge base expressed in Description Logics. The method exploits an effectiv...
Nicola Fanizzi, Claudia d'Amato, Floriana Esposito
LREC
2010
190views Education» more  LREC 2010»
13 years 11 months ago
Applying a Dynamic Bayesian Network Framework to Transliteration Identification
Identification of transliterations is aimed at enriching multilingual lexicons and improving performance in various Natural Language Processing (NLP) applications including Cross ...
Peter Nabende
ICMLA
2008
13 years 11 months ago
Ensemble Machine Methods for DNA Binding
We introduce three ensemble machine learning methods for analysis of biological DNA binding by transcription factors (TFs). The goal is to identify both TF target genes and their ...
Yue Fan, Mark A. Kon, Charles DeLisi
CONSTRAINTS
2008
182views more  CONSTRAINTS 2008»
13 years 10 months ago
Constraint Programming in Structural Bioinformatics
Bioinformatics aims at applying computer science methods to the wealth of data collected in a variety of experiments in life sciences (e.g. cell and molecular biology, biochemistry...
Pedro Barahona, Ludwig Krippahl