Sciweavers

6906 search results - page 14 / 1382
» An algorithm for modelling key terms
Sort
View
126
Voted
ALT
2005
Springer
16 years 14 days ago
PAC-Learnability of Probabilistic Deterministic Finite State Automata in Terms of Variation Distance
We consider the problem of PAC-learning distributions over strings, represented by probabilistic deterministic finite automata (PDFAs). PDFAs are a probabilistic model for the gen...
Nick Palmer, Paul W. Goldberg
152
Voted
JBCB
2010
138views more  JBCB 2010»
14 years 10 months ago
Hierarchical Classification of Gene Ontology Terms Using the Gostruct Method
Protein function prediction is an active area of research in bioinformatics. And yet, transfer of annotation on the basis of sequence or structural similarity remains widely used ...
Artem Sokolov, Asa Ben-Hur
128
Voted
IDTRUST
2009
ACM
15 years 10 months ago
Quantum resistant public key cryptography: a survey
Public key cryptography is widely used to secure transactions over the Internet. However, advances in quantum computers threaten to undermine the security assumptions upon which c...
Ray A. Perlner, David A. Cooper
119
Voted
CSFW
1999
IEEE
15 years 7 months ago
I/O Automaton Models and Proofs for Shared-Key Communication Systems
The combination of two security protocols, a simple shared-key communication protocol and the Di e-Hellman key distribution protocol, is modeled formally and proved correct. The m...
Nancy A. Lynch
134
Voted
BIBE
2005
IEEE
121views Bioinformatics» more  BIBE 2005»
15 years 9 months ago
RNA Pseudoknot Prediction Using Term Rewriting
RNA plays a critical role in mediating every step of cellular information transfer from genes to functional proteins. Pseudoknots are widely occurring structural motifs found in a...
Xuezheng Fu, Hao Wang, William L. Harrison, Robert...