Sciweavers

2328 search results - page 313 / 466
» Causal Relation Extraction
Sort
View
EUROCRYPT
1999
Springer
15 years 3 months ago
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
Abstract. This paper investigates a novel computational problem, namely the Composite Residuosity Class Problem, and its applications to public-key cryptography. We propose a new t...
Pascal Paillier
KDD
1998
ACM
140views Data Mining» more  KDD 1998»
15 years 3 months ago
Blurring the Distinction between Command and Data in Scientific KDD
We have been working on two different KDD systems for scientific data. One system involves comparative genomics, where the database contains more than 60,000 plant gene and protei...
John V. Carlis, Elizabeth Shoop, Scott Krieger
CSL
2010
Springer
15 years 10 days ago
From Feasible Proofs to Feasible Computations
We shall discuss several situations in which it is possible to extract from a proof, be it a proof in a first-order theory or a propositional proof, some feasible computational inf...
Jan Krajícek
BMCBI
2008
138views more  BMCBI 2008»
14 years 11 months ago
Application of nonnegative matrix factorization to improve profile-profile alignment features for fold recognition and remote ho
Background: Nonnegative matrix factorization (NMF) is a feature extraction method that has the property of intuitive part-based representation of the original features. This uniqu...
Inkyung Jung, Jaehyung Lee, Soo-Young Lee, Dongsup...
CORR
2008
Springer
123views Education» more  CORR 2008»
14 years 11 months ago
Provenance Traces
Provenance is information about the origin, derivation, ownership, or history of an object. It has recently been studied extensively in scientific databases and other settings due...
James Cheney, Umut A. Acar, Amal Ahmed