Sciweavers

492 search results - page 56 / 99
» The number of possibilities for random dating
Sort
View
CCS
2001
ACM
14 years 1 months ago
Interoperable strategies in automated trust negotiation
Automated trust negotiation is an approach to establishing trust between strangers through the exchange of digital credentials and the use of access control policies that specify ...
Ting Yu, Marianne Winslett, Kent E. Seamons
VLDB
1998
ACM
136views Database» more  VLDB 1998»
14 years 27 days ago
Materialized View Selection for Multidimensional Datasets
To fulfill the requirement of fast interactive multidimensional data analysis, database systems precompute aggregate views on some subsets of dimensions and their corresponding hi...
Amit Shukla, Prasad Deshpande, Jeffrey F. Naughton
BMCBI
2008
111views more  BMCBI 2008»
13 years 8 months ago
Information-based methods for predicting gene function from systematic gene knock-downs
Background: The rapid annotation of genes on a genome-wide scale is now possible for several organisms using high-throughput RNA interference assays to knock down the expression o...
Matthew T. Weirauch, Christopher K. Wong, Alexandr...
BSL
2011
13 years 3 months ago
Combinatorial dichotomies in set theory
show that an abstract analysis of one of these three set theoretic principles can sometimes lead us to results that do not require additional axioms at all but which could have bee...
Stevo Todorcevic
KDD
2008
ACM
178views Data Mining» more  KDD 2008»
14 years 9 months ago
Training structural svms with kernels using sampled cuts
Discriminative training for structured outputs has found increasing applications in areas such as natural language processing, bioinformatics, information retrieval, and computer ...
Chun-Nam John Yu, Thorsten Joachims