Sciweavers

3480 search results - page 468 / 696
» A New Era of Performance Evaluation
Sort
View
131
Voted
CCS
2010
ACM
15 years 2 months ago
TASTY: tool for automating secure two-party computations
Secure two-party computation allows two untrusting parties to jointly compute an arbitrary function on their respective private inputs while revealing no information beyond the ou...
Wilko Henecka, Stefan Kögl, Ahmad-Reza Sadegh...
AI
2008
Springer
15 years 2 months ago
An approach to efficient planning with numerical fluents and multi-criteria plan quality
Dealing with numerical information is practically important in many real-world planning domains where the executability of an action can depend on certain numerical conditions, an...
Alfonso Gerevini, Alessandro Saetti, Ivan Serina
114
Voted
BMCBI
2007
121views more  BMCBI 2007»
15 years 2 months ago
A constrained polynomial regression procedure for estimating the local False Discovery Rate
Background: In the context of genomic association studies, for which a large number of statistical tests are performed simultaneously, the local False Discovery Rate (lFDR), which...
Cyril Dalmasso, Avner Bar-Hen, Philippe Broët
CCR
2008
76views more  CCR 2008»
15 years 2 months ago
WebClass: adding rigor to manual labeling of traffic anomalies
Despite the flurry of anomaly-detection papers in recent years, effective ways to validate and compare proposed solutions have remained elusive. We argue that evaluating anomaly d...
Haakon Ringberg, Augustin Soule, Jennifer Rexford
BMCBI
2007
164views more  BMCBI 2007»
15 years 1 months ago
Comparison of probabilistic Boolean network and dynamic Bayesian network approaches for inferring gene regulatory networks
Background: The regulation of gene expression is achieved through gene regulatory networks (GRNs) in which collections of genes interact with one another and other substances in a...
Peng Li, Chaoyang Zhang, Edward J. Perkins, Ping G...