Sciweavers

127 search results - page 23 / 26
» Trust-Based Selection of Partners
Sort
View
BMCBI
2007
145views more  BMCBI 2007»
13 years 6 months ago
The utility of MAS5 expression summary and detection call algorithms
Background: Used alone, the MAS5.0 algorithm for generating expression summaries has been criticized for high False Positive rates resulting from exaggerated variance at low inten...
Stuart D. Pepper, Emma K. Saunders, Laura E. Edwar...
INFOCOM
2010
IEEE
13 years 4 months ago
A Node-failure-resilient Anonymous Communication Protocol through Commutative Path Hopping
Abstract—With rising concerns on user privacy over the Internet, anonymous communication systems that hide the identity of a participant from its partner or third parties are hig...
Fengjun Li, Bo Luo, Peng Liu, Chao-Hsien Chu
JMLR
2011
111views more  JMLR 2011»
13 years 1 months ago
Models of Cooperative Teaching and Learning
While most supervised machine learning models assume that training examples are sampled at random or adversarially, this article is concerned with models of learning from a cooper...
Sandra Zilles, Steffen Lange, Robert Holte, Martin...
RECOMB
2005
Springer
14 years 6 months ago
Recognition of Binding Patterns Common to a Set of Protein Structures
We present a novel computational method, MultiBind, for recognition of binding patterns common to a set of protein structures. It is the first method which performs a multiple alig...
Maxim Shatsky, Alexandra Shulman-Peleg, Ruth Nussi...
ATAL
2007
Springer
14 years 7 days ago
Effective tag mechanisms for evolving coordination
Tags or observable features shared by a group of similar agents are effectively used in real and artificial societies to signal intentions and can be used to infer unobservable ...
Matthew Matlock, Sandip Sen