Sciweavers

24188 search results - page 386 / 4838
» Computing on Encrypted Data
Sort
View
150
Voted
ACL
2003
15 years 6 months ago
A Word-Order Database for Testing Computational Models of Language Acquisition
An investment of effort over the last two years has begun to produce a wealth of data concerning computational psycholinguistic models of syntax acquisition. The data is generated...
William Gregory Sakas
150
Voted
ICMLA
2003
15 years 6 months ago
Robust Support Vector Machines for Anomaly Detection in Computer Security
— Using the 1998 DARPA BSM data set collected at MIT’s Lincoln Labs to study intrusion detection systems, the performance of robust support vector machines (RVSMs) was compared...
Wenjie Hu, Yihua Liao, V. Rao Vemuri
BMCBI
2008
87views more  BMCBI 2008»
15 years 4 months ago
Evaluation of two methods for computational HLA haplotypes inference using a real dataset
Background: HLA haplotype analysis has been used in population genetics and in the investigation of disease-susceptibility locus, due to its high polymorphism. Several methods for...
Bruno F. Bettencourt, Margarida R. Santos, Raquel ...
CORR
2008
Springer
86views Education» more  CORR 2008»
15 years 4 months ago
Fast computation of the median by successive binning
In many important problems, one uses the median instead of the mean to estimate a population's center, since the former is more robust. But in general, computing the median i...
Ryan J. Tibshirani
DPD
2006
114views more  DPD 2006»
15 years 4 months ago
A novel approach to resource scheduling for parallel query processing on computational grids
Advances in network technologies and the emergence of Grid computing have both increased the need and provided the infrastructure for computation and data intensive applications to...
Anastasios Gounaris, Rizos Sakellariou, Norman W. ...