Sciweavers

5465 search results - page 361 / 1093
» Assigning Types to Processes
Sort
View
BMCBI
2008
72views more  BMCBI 2008»
15 years 4 months ago
HECTAR: A method to predict subcellular targeting in heterokonts
Background: The heterokonts are a particularly interesting group of eukaryotic organisms; they include many key species of planktonic and coastal algae and several important patho...
Bernhard Gschloessl, Yann Guermeur, J. Mark Cock
BMCBI
2010
186views more  BMCBI 2010»
15 years 4 months ago
Knowledge-based biomedical word sense disambiguation: comparison of approaches
Background: Word sense disambiguation (WSD) algorithms attempt to select the proper sense of ambiguous terms in text. Resources like the UMLS provide a reference thesaurus to be u...
Antonio Jimeno Yepes, Alan R. Aronson
ENTCS
2008
137views more  ENTCS 2008»
15 years 4 months ago
Computerizing Mathematical Text with MathLang
Mathematical texts can be computerized in many ways that capture differing amounts of the mathematical meaning. At one end, there is document imaging, which captures the arrangeme...
Fairouz Kamareddine, J. B. Wells
AI
2005
Springer
15 years 4 months ago
The distributed breakout algorithms
We present a new series of distributed constraint satisfaction algorithms, the distributed breakout algorithms, which is inspired by local search algorithms for solving the constr...
Katsutoshi Hirayama, Makoto Yokoo
IACR
2011
87views more  IACR 2011»
14 years 4 months ago
Is privacy compatible with truthfulness?
In the area of privacy-preserving data mining, a differentially private mechanism intuitively encourages people to share their data truthfully because they are at little risk of ...
David Xiao