Sciweavers

6906 search results - page 14 / 1382
» An algorithm for modelling key terms
Sort
View
ALT
2005
Springer
15 years 6 months ago
PAC-Learnability of Probabilistic Deterministic Finite State Automata in Terms of Variation Distance
We consider the problem of PAC-learning distributions over strings, represented by probabilistic deterministic finite automata (PDFAs). PDFAs are a probabilistic model for the gen...
Nick Palmer, Paul W. Goldberg
JBCB
2010
138views more  JBCB 2010»
14 years 4 months ago
Hierarchical Classification of Gene Ontology Terms Using the Gostruct Method
Protein function prediction is an active area of research in bioinformatics. And yet, transfer of annotation on the basis of sequence or structural similarity remains widely used ...
Artem Sokolov, Asa Ben-Hur
IDTRUST
2009
ACM
15 years 4 months ago
Quantum resistant public key cryptography: a survey
Public key cryptography is widely used to secure transactions over the Internet. However, advances in quantum computers threaten to undermine the security assumptions upon which c...
Ray A. Perlner, David A. Cooper
CSFW
1999
IEEE
15 years 1 months ago
I/O Automaton Models and Proofs for Shared-Key Communication Systems
The combination of two security protocols, a simple shared-key communication protocol and the Di e-Hellman key distribution protocol, is modeled formally and proved correct. The m...
Nancy A. Lynch
BIBE
2005
IEEE
121views Bioinformatics» more  BIBE 2005»
15 years 3 months ago
RNA Pseudoknot Prediction Using Term Rewriting
RNA plays a critical role in mediating every step of cellular information transfer from genes to functional proteins. Pseudoknots are widely occurring structural motifs found in a...
Xuezheng Fu, Hao Wang, William L. Harrison, Robert...