Sciweavers

2089 search results - page 412 / 418
» A New Problem in String Searching
Sort
View
CSJM
2007
150views more  CSJM 2007»
14 years 9 months ago
An approach for NL text interpretation
For modeling the interpretation process of NL sentences we use the mechanisms implying semantic networks that assure syntactic – semantic text interpretation (SSI), including an...
Anatol Popescu, Sergiu Cretu
BMCBI
2005
122views more  BMCBI 2005»
14 years 9 months ago
GenClust: A genetic algorithm for clustering gene expression data
Background: Clustering is a key step in the analysis of gene expression data, and in fact, many classical clustering algorithms are used, or more innovative ones have been designe...
Vito Di Gesù, Raffaele Giancarlo, Giosu&egr...
BMCBI
2005
115views more  BMCBI 2005»
14 years 9 months ago
Statistical distributions of optimal global alignment scores of random protein sequences
Background: The inference of homology from statistically significant sequence similarity is a central issue in sequence alignments. So far the statistical distribution function un...
Hongxia Pang, Jiaowei Tang, Su-Shing Chen, Shiheng...
BMCBI
2005
100views more  BMCBI 2005»
14 years 9 months ago
Evolutionary models for insertions and deletions in a probabilistic modeling framework
Background: Probabilistic models for sequence comparison (such as hidden Markov models and pair hidden Markov models for proteins and mRNAs, or their context-free grammar counterp...
Elena Rivas
JOC
2007
133views more  JOC 2007»
14 years 9 months ago
Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication
In the security chain the weakest link is definitely the human one: human beings cannot remember long secrets and often resort to rather insecure solutions to keep track of their ...
Dario Catalano, David Pointcheval, Thomas Pornin