Sciweavers

476 search results - page 82 / 96
» Support Vector Machines with Example Dependent Costs
Sort
View
BMCBI
2008
162views more  BMCBI 2008»
13 years 8 months ago
Improved identification of conserved cassette exons using Bayesian networks
Background: Alternative splicing is a major contributor to the diversity of eukaryotic transcriptomes and proteomes. Currently, large scale detection of alternative splicing using...
Rileen Sinha, Michael Hiller, Rainer Pudimat, Ulri...
LICS
1999
IEEE
14 years 2 days ago
Proving Security Protocols Correct
Security protocols use cryptography to set up private communication channels on an insecure network. Many protocols contain flaws, and because security goals are seldom specified ...
Lawrence C. Paulson
KDD
2006
ACM
170views Data Mining» more  KDD 2006»
14 years 8 months ago
Computer aided detection via asymmetric cascade of sparse hyperplane classifiers
This paper describes a novel classification method for computer aided detection (CAD) that identifies structures of interest from medical images. CAD problems are challenging larg...
Jinbo Bi, Senthil Periaswamy, Kazunori Okada, Tosh...
PODC
2009
ACM
14 years 8 months ago
Distributed and parallel algorithms for weighted vertex cover and other covering problems
The paper presents distributed and parallel -approximation algorithms for covering problems, where is the maximum number of variables on which any constraint depends (for example...
Christos Koufogiannakis, Neal E. Young
EUROMICRO
2009
IEEE
13 years 11 months ago
Automated Feature Model-Based Generation of Refinement Transformations
Model-driven application engineering builds on the concept of model transformations. To weave additional refinement parts into an application model, so-called refinement transform...
Lucia Kapová, Thomas Goldschmidt