Sciweavers

9405 search results - page 1839 / 1881
» Computing a Model of Set Theory
Sort
View
ICML
2004
IEEE
16 years 4 months ago
Boosting margin based distance functions for clustering
The performance of graph based clustering methods critically depends on the quality of the distance function, used to compute similarities between pairs of neighboring nodes. In t...
Tomer Hertz, Aharon Bar-Hillel, Daphna Weinshall
113
Voted
MOBIHOC
2009
ACM
16 years 4 months ago
Predict and relay: an efficient routing in disruption-tolerant networks
Routing is one of the most challenging open problems in disruption-tolerant networks (DTNs) because of the shortlived wireless connectivity environment. To deal with this issue, r...
Quan Yuan, Ionut Cardei, Jie Wu
163
Voted
RECOMB
2006
Springer
16 years 3 months ago
Identifiability Issues in Phylogeny-Based Detection of Horizontal Gene Transfer
Prokaryotic organisms share genetic material across species boundaries by means of a process known as horizontal gene transfer (HGT). Detecting this process bears great significanc...
Cuong Than, Derek A. Ruths, Hideki Innan, Luay Nak...
RECOMB
2003
Springer
16 years 3 months ago
Large scale reconstruction of haplotypes from genotype data
Critical to the understanding of the genetic basis for complex diseases is the modeling of human variation. Most of this variation can be characterized by single nucleotide polymo...
Eleazar Eskin, Eran Halperin, Richard M. Karp
125
Voted
ICS
2010
Tsinghua U.
16 years 28 days ago
Non-Malleable Codes
We introduce the notion of "non-malleable codes" which relaxes the notion of error-correction and errordetection. Informally, a code is non-malleable if the message cont...
Stefan Dziembowski, Krzysztof Pietrzak, Daniel Wic...
« Prev « First page 1839 / 1881 Last » Next »