Sciweavers

404 search results - page 75 / 81
» A Functional Ontology of Observation and Measurement
Sort
View
KDD
2006
ACM
109views Data Mining» more  KDD 2006»
16 years 1 days ago
Extracting redundancy-aware top-k patterns
Observed in many applications, there is a potential need of extracting a small set of frequent patterns having not only high significance but also low redundancy. The significance...
Dong Xin, Hong Cheng, Xifeng Yan, Jiawei Han
101
Voted
RECOMB
2003
Springer
15 years 12 months ago
Physical network models and multi-source data integration
We develop a new framework for inferring models of transcriptional regulation. The models in this approach, which we call physical models, are constructed on the basis of verifiab...
Chen-Hsiang Yeang, Tommi Jaakkola
IMC
2009
ACM
15 years 6 months ago
The importance of being overheard: throughput gains in wireless mesh networks
A flurry of recent work has focused on the performance gains that may be achieved by leveraging the broadcast nature of the wireless channel. In particular, researchers have obse...
Mikhail Afanasyev, Alex C. Snoeren
APPROX
2007
Springer
104views Algorithms» more  APPROX 2007»
15 years 5 months ago
Worst-Case to Average-Case Reductions Revisited
Abstract. A fundamental goal of computational complexity (and foundations of cryptography) is to find a polynomial-time samplable distribution (e.g., the uniform distribution) and...
Dan Gutfreund, Amnon Ta-Shma
CCS
2007
ACM
15 years 5 months ago
Predicting vulnerable software components
Where do most vulnerabilities occur in software? Our Vulture tool automatically mines existing vulnerability databases and version archives to map past vulnerabilities to componen...
Stephan Neuhaus, Thomas Zimmermann, Christian Holl...