Sciweavers

993 search results - page 175 / 199
» The Complexity of Probabilistic EL
Sort
View
AAAI
2008
13 years 10 months ago
An Effective and Robust Method for Short Text Classification
Classification of texts potentially containing a complex and specific terminology requires the use of learning methods that do not rely on extensive feature engineering. In this w...
Victoria Bobicev, Marina Sokolova
BMCBI
2010
104views more  BMCBI 2010»
13 years 7 months ago
Formal reasoning on qualitative models of coinfection of HIV and Tuberculosis and HAART therapy
Background: Several diseases, many of which nowadays pandemic, consist of multifactorial pathologies. Paradigmatic examples come from the immune response to pathogens, in which ca...
Anil Sorathiya, Andrea Bracciali, Pietro Liò...
BMCBI
2010
129views more  BMCBI 2010»
13 years 7 months ago
Uncovering packaging features of co-regulated modules based on human protein interaction and transcriptional regulatory networks
Background: Network co-regulated modules are believed to have the functionality of packaging multiple biological entities, and can thus be assumed to coordinate many biological fu...
Lina Chen, Hong Wang, Liangcai Zhang, Wan Li, Qian...
ECCC
2006
120views more  ECCC 2006»
13 years 7 months ago
New Locally Decodable Codes and Private Information Retrieval Schemes
A q query Locally Decodable Code (LDC) encodes an n-bit message x as an N-bit codeword C(x), such that one can probabilistically recover any bit xi of the message by querying only...
Sergey Yekhanin
ASIACRYPT
2010
Springer
13 years 5 months ago
Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2
We revisit narrow-pipe designs that are in practical use, and their security against preimage attacks. Our results are the best known preimage attacks on Tiger, MD4, and reduced SH...
Jian Guo, San Ling, Christian Rechberger, Huaxiong...