Sciweavers

80 search results - page 16 / 16
» Fuzzy Information Retrieval Model Based on Multiple Related ...
Sort
View
STOC
2009
ACM
145views Algorithms» more  STOC 2009»
14 years 5 months ago
Non-malleable extractors and symmetric key cryptography from weak secrets
We study the question of basing symmetric key cryptography on weak secrets. In this setting, Alice and Bob share an n-bit secret W, which might not be uniformly random, but the ad...
Yevgeniy Dodis, Daniel Wichs
BIBM
2009
IEEE
172views Bioinformatics» more  BIBM 2009»
13 years 10 months ago
Identifying Gene Signatures from Cancer Progression Data Using Ordinal Analysis
—A comprehensive understanding of cancer progression may shed light on genetic and molecular mechanisms of oncogenesis, and it may provide much needed information for effective d...
Yoon Soo Pyon, Jing Li
CIDR
2009
129views Algorithms» more  CIDR 2009»
13 years 6 months ago
Extracting and Querying a Comprehensive Web Database
Recent research in domain-independent information extraction holds the promise of an automatically-constructed structured database derived from the Web. A query system based on th...
Michael J. Cafarella
BMCBI
2007
116views more  BMCBI 2007»
13 years 5 months ago
Cloning, analysis and functional annotation of expressed sequence tags from the Earthworm Eisenia fetida
Background: Eisenia fetida, commonly known as red wiggler or compost worm, belongs to the Lumbricidae family of the Annelida phylum. Little is known about its genome sequence alth...
Mehdi Pirooznia, Ping Gong, Xin Guan, Laura S. Ino...
SIGMOD
2006
ACM
232views Database» more  SIGMOD 2006»
14 years 5 months ago
To search or to crawl?: towards a query optimizer for text-centric tasks
Text is ubiquitous and, not surprisingly, many important applications rely on textual data for a variety of tasks. As a notable example, information extraction applications derive...
Panagiotis G. Ipeirotis, Eugene Agichtein, Pranay ...